mirror of
https://github.com/QuasarApp/qca.git
synced 2025-05-05 07:29:32 +00:00
Update to use new certificates. The old ones were
from openvalidation.org, but have expired. This test should now pass. svn path=/trunk/kdesupport/qca/; revision=690744
This commit is contained in:
parent
f1b60f1370
commit
515bbd19e1
unittest/certunittest
@ -9,9 +9,9 @@ add_executable(certunittest ${certunittest_bin_SRCS} )
|
||||
target_link_libraries( certunittest qca ${QT_QTTEST_LIBRARY})
|
||||
|
||||
FOREACH( testFileName RootCAcert.pem 76.pem altname.pem csr1.pem
|
||||
GoodCACRL.pem ov-root-ca-cert.crt User.pem user2goodcert.pem xmppcert.pem
|
||||
Server.pem servergood2cert.pem xmppcert.pem newreq.pem
|
||||
QualitySSLIntermediateCA.crt RootCA2cert.pem Test_CRL.crl )
|
||||
GoodCACRL.pem ov-root-ca-cert.crt User.pem QcaTestClientCert.pem xmppcert.pem
|
||||
Server.pem QcaTestServerCert.pem xmppcert.pem newreq.pem
|
||||
QualitySSLIntermediateCA.crt QcaTestRootCert.pem Test_CRL.crl )
|
||||
CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/certs/${testFileName} ${CMAKE_CURRENT_BINARY_DIR}/certs/${testFileName} COPYONLY)
|
||||
ENDFOREACH( testFileName )
|
||||
|
||||
|
84
unittest/certunittest/certs/QcaTestClientCert.pem
Normal file
84
unittest/certunittest/certs/QcaTestClientCert.pem
Normal file
@ -0,0 +1,84 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
b6:7b:e8:90:4d:70:7d:80
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=AU, ST=Australian Capital Territory, O=Qca Development and Test, OU=Certificate Generation Section, CN=Qca Test Root Certificate/emailAddress=testonly@test.example.com
|
||||
Validity
|
||||
Not Before: Jul 22 03:30:29 2007 GMT
|
||||
Not After : Jul 20 03:30:29 2012 GMT
|
||||
Subject: C=US, ST=Kalifornia, L=QcaLand, O=Qca Development and Test, OU=Certificate Generation Section, CN=Qca Test Client Certificate/emailAddress=client@test.example.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:b0:67:99:c9:d4:42:eb:f5:a6:25:7e:99:31:4e:
|
||||
d7:71:e2:15:95:8b:6a:e9:13:c6:0a:6e:cd:5d:ce:
|
||||
23:c8:b0:4a:af:d6:d3:ef:3d:09:23:97:6d:ed:49:
|
||||
0a:2c:e4:9d:a2:50:78:bc:a5:94:79:45:b1:b0:85:
|
||||
3a:02:1b:5f:f4:be:94:9e:a1:d1:a4:9c:31:02:ed:
|
||||
62:3f:b3:f1:1a:5b:7d:31:27:ae:7b:f1:67:bd:60:
|
||||
86:27:34:80:96:53:04:00:4e:d8:f2:b3:bb:6e:62:
|
||||
ab:51:ee:f9:25:ad:de:3a:4f:e5:1e:d5:42:28:e8:
|
||||
73:96:4c:1f:06:42:ee:d8:8b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
Netscape Cert Type:
|
||||
SSL Client, S/MIME
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication, E-mail Protection
|
||||
Netscape Comment:
|
||||
This certificate was issued for testing only!
|
||||
X509v3 Subject Key Identifier:
|
||||
B2:7F:D3:11:39:23:BE:1D:C4:6F:53:CE:81:AF:F1:D4:80:01:F6:F6
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:51:3F:F2:14:6E:49:6A:DC:41:B8:15:B5:A0:86:F4:2E:E4:F5:45:F8
|
||||
DirName:/C=AU/ST=Australian Capital Territory/O=Qca Development and Test/OU=Certificate Generation Section/CN=Qca Test Root Certificate/emailAddress=testonly@test.example.com
|
||||
serial:B6:7B:E8:90:4D:70:7D:7F
|
||||
|
||||
X509v3 Subject Alternative Name:
|
||||
email:client@test.example.com
|
||||
X509v3 Issuer Alternative Name:
|
||||
email:testonly@test.example.com
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
36:9a:0e:7a:a4:d3:6b:e8:d6:1b:ba:34:89:a6:dc:26:01:28:
|
||||
71:7d:28:71:22:79:ae:3b:27:2a:d5:6c:d6:99:93:c0:01:45:
|
||||
5d:78:2a:83:05:a8:eb:41:be:62:37:92:ff:b9:41:3d:37:4c:
|
||||
25:85:4b:c8:c3:ba:cd:71:06:18:12:a3:7f:2d:17:90:b2:87:
|
||||
e6:ca:86:fb:dc:d0:ef:1d:d6:b3:86:b3:28:72:45:fa:bb:dd:
|
||||
32:06:44:b1:ed:35:b6:c4:6b:54:88:49:9d:3a:2e:fa:37:3b:
|
||||
84:98:de:68:14:ac:2f:37:42:21:f5:b9:27:18:1b:5d:5e:ba:
|
||||
74:09
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFDzCCBHigAwIBAgIJALZ76JBNcH2AMA0GCSqGSIb3DQEBBQUAMIHOMQswCQYD
|
||||
VQQGEwJBVTElMCMGA1UECBMcQXVzdHJhbGlhbiBDYXBpdGFsIFRlcnJpdG9yeTEh
|
||||
MB8GA1UEChMYUWNhIERldmVsb3BtZW50IGFuZCBUZXN0MScwJQYDVQQLEx5DZXJ0
|
||||
aWZpY2F0ZSBHZW5lcmF0aW9uIFNlY3Rpb24xIjAgBgNVBAMTGVFjYSBUZXN0IFJv
|
||||
b3QgQ2VydGlmaWNhdGUxKDAmBgkqhkiG9w0BCQEWGXRlc3Rvbmx5QHRlc3QuZXhh
|
||||
bXBsZS5jb20wHhcNMDcwNzIyMDMzMDI5WhcNMTIwNzIwMDMzMDI5WjCBzjELMAkG
|
||||
A1UEBhMCVVMxEzARBgNVBAgTCkthbGlmb3JuaWExEDAOBgNVBAcTB1FjYUxhbmQx
|
||||
ITAfBgNVBAoTGFFjYSBEZXZlbG9wbWVudCBhbmQgVGVzdDEnMCUGA1UECxMeQ2Vy
|
||||
dGlmaWNhdGUgR2VuZXJhdGlvbiBTZWN0aW9uMSQwIgYDVQQDExtRY2EgVGVzdCBD
|
||||
bGllbnQgQ2VydGlmaWNhdGUxJjAkBgkqhkiG9w0BCQEWF2NsaWVudEB0ZXN0LmV4
|
||||
YW1wbGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCwZ5nJ1ELr9aYl
|
||||
fpkxTtdx4hWVi2rpE8YKbs1dziPIsEqv1tPvPQkjl23tSQos5J2iUHi8pZR5RbGw
|
||||
hToCG1/0vpSeodGknDEC7WI/s/EaW30xJ6578We9YIYnNICWUwQATtjys7tuYqtR
|
||||
7vklrd46T+Ue1UIo6HOWTB8GQu7YiwIDAQABo4IB8TCCAe0wEQYJYIZIAYb4QgEB
|
||||
BAQDAgWgMAsGA1UdDwQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
|
||||
AwQwPAYJYIZIAYb4QgENBC8WLVRoaXMgY2VydGlmaWNhdGUgd2FzIGlzc3VlZCBm
|
||||
b3IgdGVzdGluZyBvbmx5ITAdBgNVHQ4EFgQUsn/TETkjvh3Eb1POga/x1IAB9vYw
|
||||
ggEDBgNVHSMEgfswgfiAFFE/8hRuSWrcQbgVtaCG9C7k9UX4oYHUpIHRMIHOMQsw
|
||||
CQYDVQQGEwJBVTElMCMGA1UECBMcQXVzdHJhbGlhbiBDYXBpdGFsIFRlcnJpdG9y
|
||||
eTEhMB8GA1UEChMYUWNhIERldmVsb3BtZW50IGFuZCBUZXN0MScwJQYDVQQLEx5D
|
||||
ZXJ0aWZpY2F0ZSBHZW5lcmF0aW9uIFNlY3Rpb24xIjAgBgNVBAMTGVFjYSBUZXN0
|
||||
IFJvb3QgQ2VydGlmaWNhdGUxKDAmBgkqhkiG9w0BCQEWGXRlc3Rvbmx5QHRlc3Qu
|
||||
ZXhhbXBsZS5jb22CCQC2e+iQTXB9fzAiBgNVHREEGzAZgRdjbGllbnRAdGVzdC5l
|
||||
eGFtcGxlLmNvbTAkBgNVHRIEHTAbgRl0ZXN0b25seUB0ZXN0LmV4YW1wbGUuY29t
|
||||
MA0GCSqGSIb3DQEBBQUAA4GBADaaDnqk02vo1hu6NImm3CYBKHF9KHEiea47JyrV
|
||||
bNaZk8ABRV14KoMFqOtBvmI3kv+5QT03TCWFS8jDus1xBhgSo38tF5Cyh+bKhvvc
|
||||
0O8d1rOGsyhyRfq73TIGRLHtNbbEa1SISZ06Lvo3O4SY3mgUrC83QiH1uScYG11e
|
||||
unQJ
|
||||
-----END CERTIFICATE-----
|
83
unittest/certunittest/certs/QcaTestRootCert.pem
Normal file
83
unittest/certunittest/certs/QcaTestRootCert.pem
Normal file
@ -0,0 +1,83 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
b6:7b:e8:90:4d:70:7d:7f
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=AU, ST=Australian Capital Territory, O=Qca Development and Test, OU=Certificate Generation Section, CN=Qca Test Root Certificate/emailAddress=testonly@test.example.com
|
||||
Validity
|
||||
Not Before: Jul 22 01:48:15 2007 GMT
|
||||
Not After : Jan 11 01:48:15 2013 GMT
|
||||
Subject: C=AU, ST=Australian Capital Territory, O=Qca Development and Test, OU=Certificate Generation Section, CN=Qca Test Root Certificate/emailAddress=testonly@test.example.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:a1:a2:3e:9e:53:de:98:2c:2f:9e:fa:12:fa:54:
|
||||
6c:0a:0a:e8:23:f4:25:86:24:da:ed:6f:18:e2:6e:
|
||||
1e:ae:36:4e:45:63:0d:5b:20:aa:09:70:55:b9:a1:
|
||||
08:e3:cb:3d:e3:c3:ca:34:c3:c7:90:30:50:51:d6:
|
||||
30:b3:3f:12:70:99:ae:2d:c8:2e:ea:c6:c6:43:e5:
|
||||
9f:30:ab:e3:5b:d9:b0:91:92:c2:94:79:79:9b:87:
|
||||
05:60:01:8c:f1:0e:75:f7:82:d6:f9:e6:fb:45:b8:
|
||||
4d:53:eb:66:a0:98:93:28:d7:1e:db:43:3d:84:9b:
|
||||
2b:1f:ee:af:d8:23:b5:a1:cd
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Non Repudiation, Key Encipherment, Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
51:3F:F2:14:6E:49:6A:DC:41:B8:15:B5:A0:86:F4:2E:E4:F5:45:F8
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:51:3F:F2:14:6E:49:6A:DC:41:B8:15:B5:A0:86:F4:2E:E4:F5:45:F8
|
||||
DirName:/C=AU/ST=Australian Capital Territory/O=Qca Development and Test/OU=Certificate Generation Section/CN=Qca Test Root Certificate/emailAddress=testonly@test.example.com
|
||||
serial:B6:7B:E8:90:4D:70:7D:7F
|
||||
|
||||
X509v3 Subject Alternative Name:
|
||||
email:testonly@test.example.com
|
||||
X509v3 Issuer Alternative Name:
|
||||
email:testonly@test.example.com
|
||||
Netscape Cert Type:
|
||||
SSL CA, S/MIME CA, Object Signing CA
|
||||
Netscape Comment:
|
||||
This certificate was issued for testing only!
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
0f:b6:d9:37:b3:d8:bb:69:1e:ce:1a:35:29:1b:ce:d5:38:3e:
|
||||
29:13:17:91:5b:1f:9c:59:52:67:d3:05:91:2a:e8:7f:b9:76:
|
||||
1a:01:f6:9f:07:74:be:e4:37:87:d0:9b:84:c6:81:3f:c4:96:
|
||||
52:46:80:52:a7:7b:14:fd:f6:4d:23:15:b6:7e:2a:a6:d7:90:
|
||||
97:4f:22:7c:3e:7d:12:84:28:a4:9a:30:67:77:16:f7:80:0f:
|
||||
6a:d0:82:fc:f6:91:39:14:d2:a5:de:18:f1:bb:38:f1:98:88:
|
||||
1c:13:63:e9:a3:d7:b5:b0:70:f2:82:58:bd:ef:3c:02:42:a0:
|
||||
7e:c9
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFAzCCBGygAwIBAgIJALZ76JBNcH1/MA0GCSqGSIb3DQEBBQUAMIHOMQswCQYD
|
||||
VQQGEwJBVTElMCMGA1UECBMcQXVzdHJhbGlhbiBDYXBpdGFsIFRlcnJpdG9yeTEh
|
||||
MB8GA1UEChMYUWNhIERldmVsb3BtZW50IGFuZCBUZXN0MScwJQYDVQQLEx5DZXJ0
|
||||
aWZpY2F0ZSBHZW5lcmF0aW9uIFNlY3Rpb24xIjAgBgNVBAMTGVFjYSBUZXN0IFJv
|
||||
b3QgQ2VydGlmaWNhdGUxKDAmBgkqhkiG9w0BCQEWGXRlc3Rvbmx5QHRlc3QuZXhh
|
||||
bXBsZS5jb20wHhcNMDcwNzIyMDE0ODE1WhcNMTMwMTExMDE0ODE1WjCBzjELMAkG
|
||||
A1UEBhMCQVUxJTAjBgNVBAgTHEF1c3RyYWxpYW4gQ2FwaXRhbCBUZXJyaXRvcnkx
|
||||
ITAfBgNVBAoTGFFjYSBEZXZlbG9wbWVudCBhbmQgVGVzdDEnMCUGA1UECxMeQ2Vy
|
||||
dGlmaWNhdGUgR2VuZXJhdGlvbiBTZWN0aW9uMSIwIAYDVQQDExlRY2EgVGVzdCBS
|
||||
b290IENlcnRpZmljYXRlMSgwJgYJKoZIhvcNAQkBFhl0ZXN0b25seUB0ZXN0LmV4
|
||||
YW1wbGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQChoj6eU96YLC+e
|
||||
+hL6VGwKCugj9CWGJNrtbxjibh6uNk5FYw1bIKoJcFW5oQjjyz3jw8o0w8eQMFBR
|
||||
1jCzPxJwma4tyC7qxsZD5Z8wq+Nb2bCRksKUeXmbhwVgAYzxDnX3gtb55vtFuE1T
|
||||
62agmJMo1x7bQz2Emysf7q/YI7WhzQIDAQABo4IB5TCCAeEwDwYDVR0TAQH/BAUw
|
||||
AwEB/zALBgNVHQ8EBAMCAeYwHQYDVR0OBBYEFFE/8hRuSWrcQbgVtaCG9C7k9UX4
|
||||
MIIBAwYDVR0jBIH7MIH4gBRRP/IUbklq3EG4FbWghvQu5PVF+KGB1KSB0TCBzjEL
|
||||
MAkGA1UEBhMCQVUxJTAjBgNVBAgTHEF1c3RyYWxpYW4gQ2FwaXRhbCBUZXJyaXRv
|
||||
cnkxITAfBgNVBAoTGFFjYSBEZXZlbG9wbWVudCBhbmQgVGVzdDEnMCUGA1UECxMe
|
||||
Q2VydGlmaWNhdGUgR2VuZXJhdGlvbiBTZWN0aW9uMSIwIAYDVQQDExlRY2EgVGVz
|
||||
dCBSb290IENlcnRpZmljYXRlMSgwJgYJKoZIhvcNAQkBFhl0ZXN0b25seUB0ZXN0
|
||||
LmV4YW1wbGUuY29tggkAtnvokE1wfX8wJAYDVR0RBB0wG4EZdGVzdG9ubHlAdGVz
|
||||
dC5leGFtcGxlLmNvbTAkBgNVHRIEHTAbgRl0ZXN0b25seUB0ZXN0LmV4YW1wbGUu
|
||||
Y29tMBEGCWCGSAGG+EIBAQQEAwIABzA8BglghkgBhvhCAQ0ELxYtVGhpcyBjZXJ0
|
||||
aWZpY2F0ZSB3YXMgaXNzdWVkIGZvciB0ZXN0aW5nIG9ubHkhMA0GCSqGSIb3DQEB
|
||||
BQUAA4GBAA+22Tez2LtpHs4aNSkbztU4PikTF5FbH5xZUmfTBZEq6H+5dhoB9p8H
|
||||
dL7kN4fQm4TGgT/EllJGgFKnexT99k0jFbZ+KqbXkJdPInw+fRKEKKSaMGd3FveA
|
||||
D2rQgvz2kTkU0qXeGPG7OPGYiBwTY+mj17WwcPKCWL3vPAJCoH7J
|
||||
-----END CERTIFICATE-----
|
84
unittest/certunittest/certs/QcaTestServerCert.pem
Normal file
84
unittest/certunittest/certs/QcaTestServerCert.pem
Normal file
@ -0,0 +1,84 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
b6:7b:e8:90:4d:70:7d:81
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
Issuer: C=AU, ST=Australian Capital Territory, O=Qca Development and Test, OU=Certificate Generation Section, CN=Qca Test Root Certificate/emailAddress=testonly@test.example.com
|
||||
Validity
|
||||
Not Before: Jul 22 06:05:39 2007 GMT
|
||||
Not After : Jul 20 06:05:39 2012 GMT
|
||||
Subject: C=IL, ST=Qca Province, L=TLS City, O=Qca Development and Test, OU=Server Management Section, CN=Qca Server Test certificate/emailAddress=server@test.example.com
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public Key: (1024 bit)
|
||||
Modulus (1024 bit):
|
||||
00:c1:59:ff:39:1d:96:af:d8:55:cd:89:a1:19:14:
|
||||
a0:63:33:2a:1c:09:92:07:ea:8e:64:91:17:19:3a:
|
||||
ca:6d:a8:2a:81:7d:a6:48:6a:8c:04:d5:dc:9b:b0:
|
||||
86:44:8c:65:27:9c:a6:63:ec:f0:f6:f2:03:76:4e:
|
||||
46:72:20:3c:eb:ac:c5:a7:4d:fa:36:84:a7:a1:45:
|
||||
c2:54:43:b9:5d:88:17:b6:b2:6c:af:ce:9c:e2:2e:
|
||||
65:e2:82:4c:02:a4:4d:91:58:7d:16:14:dc:29:1c:
|
||||
1c:bc:c5:89:ac:e0:ea:f7:2d:9a:fe:d8:ca:53:98:
|
||||
ce:ab:3a:c2:60:ad:91:e9:4f
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
Netscape Cert Type:
|
||||
SSL Server
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Non Repudiation, Key Encipherment
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
Netscape Comment:
|
||||
This certificate was issued for qca server testing only!
|
||||
X509v3 Subject Key Identifier:
|
||||
3C:AA:B3:B7:59:75:DB:2C:95:AF:B4:81:FA:56:40:D8:98:6B:27:CB
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:51:3F:F2:14:6E:49:6A:DC:41:B8:15:B5:A0:86:F4:2E:E4:F5:45:F8
|
||||
DirName:/C=AU/ST=Australian Capital Territory/O=Qca Development and Test/OU=Certificate Generation Section/CN=Qca Test Root Certificate/emailAddress=testonly@test.example.com
|
||||
serial:B6:7B:E8:90:4D:70:7D:7F
|
||||
|
||||
X509v3 Subject Alternative Name:
|
||||
email:server@test.example.com
|
||||
X509v3 Issuer Alternative Name:
|
||||
email:testonly@test.example.com
|
||||
Signature Algorithm: sha1WithRSAEncryption
|
||||
0f:0b:9f:d9:38:62:20:40:a5:ff:0c:7b:d5:21:82:dd:9a:74:
|
||||
94:81:72:aa:94:fc:1b:e0:53:56:e1:65:67:ed:a5:97:94:87:
|
||||
fc:ee:37:66:e5:bf:7e:92:1b:b9:a4:e8:96:4a:5e:67:64:de:
|
||||
f8:43:47:de:50:85:f6:a6:47:df:b4:ff:e3:93:ef:8e:b1:7c:
|
||||
38:52:e4:e4:90:45:d1:85:db:c2:db:91:81:44:5a:41:a8:9b:
|
||||
68:f6:dd:4b:c0:88:f0:fb:f0:73:17:9d:c4:9e:2b:1d:ba:6c:
|
||||
43:bd:38:a3:f7:3f:55:cb:1a:7b:c4:5e:4a:39:fc:a2:86:ed:
|
||||
d9:ba
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFDjCCBHegAwIBAgIJALZ76JBNcH2BMA0GCSqGSIb3DQEBBQUAMIHOMQswCQYD
|
||||
VQQGEwJBVTElMCMGA1UECBMcQXVzdHJhbGlhbiBDYXBpdGFsIFRlcnJpdG9yeTEh
|
||||
MB8GA1UEChMYUWNhIERldmVsb3BtZW50IGFuZCBUZXN0MScwJQYDVQQLEx5DZXJ0
|
||||
aWZpY2F0ZSBHZW5lcmF0aW9uIFNlY3Rpb24xIjAgBgNVBAMTGVFjYSBUZXN0IFJv
|
||||
b3QgQ2VydGlmaWNhdGUxKDAmBgkqhkiG9w0BCQEWGXRlc3Rvbmx5QHRlc3QuZXhh
|
||||
bXBsZS5jb20wHhcNMDcwNzIyMDYwNTM5WhcNMTIwNzIwMDYwNTM5WjCBzDELMAkG
|
||||
A1UEBhMCSUwxFTATBgNVBAgTDFFjYSBQcm92aW5jZTERMA8GA1UEBxMIVExTIENp
|
||||
dHkxITAfBgNVBAoTGFFjYSBEZXZlbG9wbWVudCBhbmQgVGVzdDEiMCAGA1UECxMZ
|
||||
U2VydmVyIE1hbmFnZW1lbnQgU2VjdGlvbjEkMCIGA1UEAxMbUWNhIFNlcnZlciBU
|
||||
ZXN0IGNlcnRpZmljYXRlMSYwJAYJKoZIhvcNAQkBFhdzZXJ2ZXJAdGVzdC5leGFt
|
||||
cGxlLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwVn/OR2Wr9hVzYmh
|
||||
GRSgYzMqHAmSB+qOZJEXGTrKbagqgX2mSGqMBNXcm7CGRIxlJ5ymY+zw9vIDdk5G
|
||||
ciA866zFp036NoSnoUXCVEO5XYgXtrJsr86c4i5l4oJMAqRNkVh9FhTcKRwcvMWJ
|
||||
rODq9y2a/tjKU5jOqzrCYK2R6U8CAwEAAaOCAfIwggHuMBEGCWCGSAGG+EIBAQQE
|
||||
AwIGQDALBgNVHQ8EBAMCBeAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwRwYJYIZIAYb4
|
||||
QgENBDoWOFRoaXMgY2VydGlmaWNhdGUgd2FzIGlzc3VlZCBmb3IgcWNhIHNlcnZl
|
||||
ciB0ZXN0aW5nIG9ubHkhMB0GA1UdDgQWBBQ8qrO3WXXbLJWvtIH6VkDYmGsnyzCC
|
||||
AQMGA1UdIwSB+zCB+IAUUT/yFG5JatxBuBW1oIb0LuT1RfihgdSkgdEwgc4xCzAJ
|
||||
BgNVBAYTAkFVMSUwIwYDVQQIExxBdXN0cmFsaWFuIENhcGl0YWwgVGVycml0b3J5
|
||||
MSEwHwYDVQQKExhRY2EgRGV2ZWxvcG1lbnQgYW5kIFRlc3QxJzAlBgNVBAsTHkNl
|
||||
cnRpZmljYXRlIEdlbmVyYXRpb24gU2VjdGlvbjEiMCAGA1UEAxMZUWNhIFRlc3Qg
|
||||
Um9vdCBDZXJ0aWZpY2F0ZTEoMCYGCSqGSIb3DQEJARYZdGVzdG9ubHlAdGVzdC5l
|
||||
eGFtcGxlLmNvbYIJALZ76JBNcH1/MCIGA1UdEQQbMBmBF3NlcnZlckB0ZXN0LmV4
|
||||
YW1wbGUuY29tMCQGA1UdEgQdMBuBGXRlc3Rvbmx5QHRlc3QuZXhhbXBsZS5jb20w
|
||||
DQYJKoZIhvcNAQEFBQADgYEADwuf2ThiIECl/wx71SGC3Zp0lIFyqpT8G+BTVuFl
|
||||
Z+2ll5SH/O43ZuW/fpIbuaTolkpeZ2Te+ENH3lCF9qZH37T/45PvjrF8OFLk5JBF
|
||||
0YXbwtuRgURaQaibaPbdS8CI8PvwcxedxJ4rHbpsQ704o/c/Vcsae8ReSjn8oobt
|
||||
2bo=
|
||||
-----END CERTIFICATE-----
|
@ -324,18 +324,18 @@ void CertUnitTest::checkClientCerts()
|
||||
QWARN( QString( "Certificate handling not supported for "+provider).toLocal8Bit() );
|
||||
else {
|
||||
QCA::ConvertResult resultClient2;
|
||||
QCA::Certificate client2 = QCA::Certificate::fromPEMFile( "certs/user2goodcert.pem", &resultClient2, provider);
|
||||
QCA::Certificate client2 = QCA::Certificate::fromPEMFile( "certs/QcaTestClientCert.pem", &resultClient2, provider);
|
||||
QCOMPARE( resultClient2, QCA::ConvertGood );
|
||||
QCOMPARE( client2.isNull(), false );
|
||||
QCOMPARE( client2.isCA(), false );
|
||||
QCOMPARE( client2.isSelfSigned(), false );
|
||||
|
||||
QCOMPARE( client2.serialNumber(), QCA::BigInteger(4) );
|
||||
QCOMPARE( client2.serialNumber(), QCA::BigInteger("13149359243510447488") );
|
||||
|
||||
QCOMPARE( client2.commonName(), QString("Insecure User Test Cert") );
|
||||
QCOMPARE( client2.commonName(), QString("Qca Test Client Certificate") );
|
||||
|
||||
QCOMPARE( client2.notValidBefore().toString(), QDateTime( QDate( 2002, 7, 1 ), QTime( 9, 58, 50 ), Qt::UTC ).toString() );
|
||||
QCOMPARE( client2.notValidAfter().toString(), QDateTime( QDate( 2007, 6, 30 ), QTime( 9, 58, 50 ), Qt::UTC ).toString() );
|
||||
QCOMPARE( client2.notValidBefore().toString(), QDateTime( QDate( 2007, 7, 22 ), QTime( 3, 30, 29 ), Qt::UTC ).toString() );
|
||||
QCOMPARE( client2.notValidAfter().toString(), QDateTime( QDate( 2012, 7, 20 ), QTime( 3, 30, 29 ), Qt::UTC ).toString() );
|
||||
|
||||
QCOMPARE( client2.constraints().contains(QCA::DigitalSignature), (QBool)true );
|
||||
QCOMPARE( client2.constraints().contains(QCA::NonRepudiation), (QBool)true );
|
||||
@ -361,19 +361,20 @@ void CertUnitTest::checkClientCerts()
|
||||
|
||||
QCA::CertificateInfo subject2 = client2.subjectInfo();
|
||||
QCOMPARE( subject2.isEmpty(), false );
|
||||
QCOMPARE( subject2.values(QCA::Country).contains("de"), (QBool)true );
|
||||
QCOMPARE( subject2.values(QCA::Organization).contains("InsecureTestCertificate"), (QBool)true );
|
||||
QCOMPARE( subject2.values(QCA::CommonName).contains("Insecure User Test Cert"), (QBool)true );
|
||||
QVERIFY( subject2.values(QCA::Country).contains("US") );
|
||||
QVERIFY( subject2.values(QCA::Organization).contains("Qca Development and Test") );
|
||||
QVERIFY( subject2.values(QCA::OrganizationalUnit).contains("Certificate Generation Section") );
|
||||
QVERIFY( subject2.values(QCA::CommonName).contains("Qca Test Client Certificate") );
|
||||
|
||||
QCA::CertificateInfo issuer2 = client2.issuerInfo();
|
||||
QCOMPARE( issuer2.isEmpty(), false );
|
||||
QCOMPARE( issuer2.values(QCA::Country).contains("de"), (QBool)true );
|
||||
QCOMPARE( issuer2.values(QCA::Organization).contains("InsecureTestCertificate"), (QBool)true );
|
||||
QCOMPARE( issuer2.values(QCA::CommonName).contains("For Tests Only next generation"), (QBool)true );
|
||||
QVERIFY( issuer2.values(QCA::Country).contains("AU") );
|
||||
QVERIFY( issuer2.values(QCA::Organization).contains("Qca Development and Test") );
|
||||
QVERIFY( issuer2.values(QCA::CommonName).contains("Qca Test Root Certificate") );
|
||||
|
||||
QByteArray subjectKeyID = QCA::Hex().stringToArray("7b5c26f014e47d3c5c9d5cb486a5e76cbe8e77fb").toByteArray();
|
||||
QByteArray subjectKeyID = QCA::Hex().stringToArray("B27FD3113923BE1DC46F53CE81AFF1D48001F6F6").toByteArray();
|
||||
QCOMPARE( client2.subjectKeyId(), subjectKeyID );
|
||||
QCOMPARE( QCA::Hex().arrayToString(client2.issuerKeyId()), QString("8f084f9c53c15cc8e60cd7132ecb523c23960214") );
|
||||
QCOMPARE( QCA::Hex().arrayToString(client2.issuerKeyId()), QString("513ff2146e496adc41b815b5a086f42ee4f545f8") );
|
||||
|
||||
QCA::PublicKey pubkey2 = client2.subjectPublicKey();
|
||||
QCOMPARE( pubkey2.isNull(), false );
|
||||
@ -386,14 +387,14 @@ void CertUnitTest::checkClientCerts()
|
||||
|
||||
QCOMPARE( client2.pathLimit(), 0 );
|
||||
|
||||
QCOMPARE( client2.signatureAlgorithm(), QCA::EMSA3_MD5 );
|
||||
QCOMPARE( client2.signatureAlgorithm(), QCA::EMSA3_SHA1 );
|
||||
|
||||
QCA::CertificateCollection trusted;
|
||||
QCA::CertificateCollection untrusted;
|
||||
QCOMPARE( client2.validate( trusted, untrusted ), QCA::ErrorInvalidCA );
|
||||
|
||||
QCA::ConvertResult resultca2;
|
||||
QCA::Certificate ca2 = QCA::Certificate::fromPEMFile( "certs/RootCA2cert.pem", &resultca2, provider);
|
||||
QCA::Certificate ca2 = QCA::Certificate::fromPEMFile( "certs/QcaTestRootCert.pem", &resultca2, provider);
|
||||
QCOMPARE( resultca2, QCA::ConvertGood );
|
||||
trusted.addCertificate( ca2 );
|
||||
|
||||
@ -822,24 +823,24 @@ void CertUnitTest::checkServerCerts()
|
||||
QWARN( QString( "Certificate handling not supported for "+provider).toLocal8Bit() );
|
||||
else {
|
||||
QCA::ConvertResult resultServer1;
|
||||
QCA::Certificate server1 = QCA::Certificate::fromPEMFile( "certs/servergood2cert.pem", &resultServer1, provider);
|
||||
QCA::Certificate server1 = QCA::Certificate::fromPEMFile( "certs/QcaTestServerCert.pem", &resultServer1, provider);
|
||||
QCOMPARE( resultServer1, QCA::ConvertGood );
|
||||
QCOMPARE( server1.isNull(), false );
|
||||
QCOMPARE( server1.isCA(), false );
|
||||
QCOMPARE( server1.isSelfSigned(), false );
|
||||
|
||||
QCOMPARE( server1.serialNumber(), QCA::BigInteger(6) );
|
||||
QCOMPARE( server1.serialNumber(), QCA::BigInteger("13149359243510447489") );
|
||||
|
||||
QCOMPARE( server1.commonName(), QString("Insecure Server Cert") );
|
||||
QCOMPARE( server1.commonName(), QString("Qca Server Test certificate") );
|
||||
|
||||
QCOMPARE( server1.notValidBefore().toString(), QDateTime( QDate( 2002, 7, 1 ), QTime( 10, 21, 49 ), Qt::UTC ).toString() );
|
||||
QCOMPARE( server1.notValidAfter().toString(), QDateTime( QDate( 2007, 6, 30 ), QTime( 10, 21, 49 ), Qt::UTC ).toString() );
|
||||
QCOMPARE( server1.notValidBefore().toString(), QDateTime( QDate( 2007, 7, 22 ), QTime( 6, 5, 39 ), Qt::UTC ).toString() );
|
||||
QCOMPARE( server1.notValidAfter().toString(), QDateTime( QDate( 2012, 7, 20 ), QTime( 6, 5, 39 ), Qt::UTC ).toString() );
|
||||
|
||||
QCOMPARE( server1.constraints().contains(QCA::DigitalSignature), (QBool)true );
|
||||
QCOMPARE( server1.constraints().contains(QCA::NonRepudiation), (QBool)false );
|
||||
QCOMPARE( server1.constraints().contains(QCA::NonRepudiation), (QBool)true );
|
||||
QCOMPARE( server1.constraints().contains(QCA::KeyEncipherment), (QBool)true );
|
||||
QCOMPARE( server1.constraints().contains(QCA::DataEncipherment), (QBool)false );
|
||||
QCOMPARE( server1.constraints().contains(QCA::KeyAgreement), (QBool)true );
|
||||
QCOMPARE( server1.constraints().contains(QCA::KeyAgreement), (QBool)false );
|
||||
QCOMPARE( server1.constraints().contains(QCA::KeyCertificateSign), (QBool)false );
|
||||
QCOMPARE( server1.constraints().contains(QCA::CRLSign), (QBool)false );
|
||||
QCOMPARE( server1.constraints().contains(QCA::EncipherOnly), (QBool)false );
|
||||
@ -859,19 +860,21 @@ void CertUnitTest::checkServerCerts()
|
||||
|
||||
QCA::CertificateInfo subject1 = server1.subjectInfo();
|
||||
QCOMPARE( subject1.isEmpty(), false );
|
||||
QCOMPARE( subject1.values(QCA::Country).contains("de"), (QBool)true );
|
||||
QCOMPARE( subject1.values(QCA::Organization).contains("InsecureTestCertificate"), (QBool)true );
|
||||
QCOMPARE( subject1.values(QCA::CommonName).contains("Insecure Server Cert"), (QBool)true );
|
||||
QVERIFY( subject1.values(QCA::Country).contains("IL") );
|
||||
QVERIFY( subject1.values(QCA::Organization).contains("Qca Development and Test") );
|
||||
QVERIFY( subject1.values(QCA::OrganizationalUnit).contains("Server Management Section") );
|
||||
QVERIFY( subject1.values(QCA::CommonName).contains("Qca Server Test certificate") );
|
||||
|
||||
QCA::CertificateInfo issuer1 = server1.issuerInfo();
|
||||
QCOMPARE( issuer1.isEmpty(), false );
|
||||
QCOMPARE( issuer1.values(QCA::Country).contains("de"), (QBool)true );
|
||||
QCOMPARE( issuer1.values(QCA::Organization).contains("InsecureTestCertificate"), (QBool)true );
|
||||
QCOMPARE( issuer1.values(QCA::CommonName).contains("For Tests Only next generation"), (QBool)true );
|
||||
QVERIFY( issuer1.values(QCA::Country).contains("AU") );
|
||||
QVERIFY( issuer1.values(QCA::Organization).contains("Qca Development and Test") );
|
||||
QVERIFY( issuer1.values(QCA::OrganizationalUnit).contains("Certificate Generation Section") );
|
||||
QVERIFY( issuer1.values(QCA::CommonName).contains("Qca Test Root Certificate") );
|
||||
|
||||
QByteArray subjectKeyID = QCA::Hex().stringToArray("f5f1298acd3198962b005b7855f6cc6955eef318").toByteArray();
|
||||
QByteArray subjectKeyID = QCA::Hex().stringToArray("3CAAB3B75975DB2C95AFB481FA5640D8986B27CB").toByteArray();
|
||||
QCOMPARE( server1.subjectKeyId(), subjectKeyID );
|
||||
QByteArray authorityKeyID = QCA::Hex().stringToArray("8f084f9c53c15cc8e60cd7132ecb523c23960214").toByteArray();
|
||||
QByteArray authorityKeyID = QCA::Hex().stringToArray("513ff2146e496adc41b815b5a086f42ee4f545f8").toByteArray();
|
||||
QCOMPARE( server1.issuerKeyId(), authorityKeyID );
|
||||
|
||||
QCA::PublicKey pubkey1 = server1.subjectPublicKey();
|
||||
@ -885,14 +888,14 @@ void CertUnitTest::checkServerCerts()
|
||||
|
||||
QCOMPARE( server1.pathLimit(), 0 );
|
||||
|
||||
QCOMPARE( server1.signatureAlgorithm(), QCA::EMSA3_MD5 );
|
||||
QCOMPARE( server1.signatureAlgorithm(), QCA::EMSA3_SHA1 );
|
||||
|
||||
QCA::CertificateCollection trusted;
|
||||
QCA::CertificateCollection untrusted;
|
||||
QCOMPARE( server1.validate( trusted, untrusted ), QCA::ErrorInvalidCA );
|
||||
|
||||
QCA::ConvertResult resultca1;
|
||||
QCA::Certificate ca1 = QCA::Certificate::fromPEMFile( "certs/RootCA2cert.pem", &resultca1, provider);
|
||||
QCA::Certificate ca1 = QCA::Certificate::fromPEMFile( "certs/QcaTestRootCert.pem", &resultca1, provider);
|
||||
QCOMPARE( resultca1, QCA::ConvertGood );
|
||||
trusted.addCertificate( ca1 );
|
||||
QCOMPARE( server1.validate( trusted, untrusted ), QCA::ValidityGood );
|
||||
|
Loading…
x
Reference in New Issue
Block a user