pike.git
/
lib
/
modules
/
Standards.pmod
/
testsuite.in
version
»
Context lines:
10
20
40
80
file
none
3
pike.git/lib/modules/Standards.pmod/testsuite.in:7:
test_equal(Standards.ISO639_2.map_639_1("sv"),"swe") test_equal(Standards.ISO639_2.map_639_1("xx"),0) test_true(sizeof(Standards.ISO639_2.list_639_1())>150) test_do( class A { inherit Standards.ISO639_2; void create() { foreach(indices(b_to_t), string symbol) if(languages[symbol]) error("Overlap in symbol %s\n", symbol); }
-
}(); )
+
}
+
A
(); )
// - Standards.PEM test_any_equal([[ string pem = #"-----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type: 4,ENCRYPTED Content-Domain: RFC822 DEK-Info: DES-CBC,F8143EDE5960C597 Originator-ID-Symmetric: linn@zendia.enet.dec.com,, Recipient-ID-Symmetric: linn@zendia.enet.dec.com,ptf-kmc,3
pike.git/lib/modules/Standards.pmod/testsuite.in:44:
"content-domain": "RFC822", "dek-info": "DES-CBC,F8143EDE5960C597", "key-info": "DES-ECB,RSA-MD2,9FD3AAD2F2691B9A, B70665BB9BF7CBCDA60195DB94F727D3\0DES-ECB,RSA-MD2,161A3F75DC82EF26, E2EF532C65CBCFF79F83A2658132DB47", "originator-id-symmetric": "linn@zendia.enet.dec.com,,", "post": "PRIVACY-ENHANCED MESSAGE", "pre": "PRIVACY-ENHANCED MESSAGE", "proc-type": "4,ENCRYPTED", "recipient-id-symmetric": "linn@zendia.enet.dec.com,ptf-kmc,3\0pem-dev@tis.com,ptf-kmc,4" ]) ]])
+
test_any([[
+
return Standards.PEM.Message(#"-----BEGIN FOO-----
+
QkFS
+
-----END FOO-----")->body;
+
]], "BAR")
// - Standards.URI
-
+
// RFC 3986 5.4.1 Normal Examples
test_equal((string)Standards.URI("g:h", "http://a/b/c/d;p?q"), "g:h") test_equal((string)Standards.URI("g", "http://a/b/c/d;p?q"), "http://a/b/c/g") test_equal((string)Standards.URI("./g", "http://a/b/c/d;p?q"), "http://a/b/c/g") test_equal((string)Standards.URI("g/", "http://a/b/c/d;p?q"), "http://a/b/c/g/") test_equal((string)Standards.URI("/g", "http://a/b/c/d;p?q"), "http://a/g") test_equal((string)Standards.URI("//g", "http://a/b/c/d;p?q"), "http://g") test_equal((string)Standards.URI("?y", "http://a/b/c/d;p?q"), "http://a/b/c/d;p?y") test_equal((string)Standards.URI("g?y", "http://a/b/c/d;p?q"), "http://a/b/c/g?y") test_equal((string)Standards.URI("#s", "http://a/b/c/d;p?q"), "http://a/b/c/d;p?q#s") test_equal((string)Standards.URI("g#s", "http://a/b/c/d;p?q"), "http://a/b/c/g#s")
pike.git/lib/modules/Standards.pmod/testsuite.in:68:
test_equal((string)Standards.URI("g;x", "http://a/b/c/d;p?q"), "http://a/b/c/g;x") test_equal((string)Standards.URI("g;x?y#s", "http://a/b/c/d;p?q"), "http://a/b/c/g;x?y#s") test_equal((string)Standards.URI(".", "http://a/b/c/d;p?q"), "http://a/b/c/") test_equal((string)Standards.URI("./", "http://a/b/c/d;p?q"), "http://a/b/c/") test_equal((string)Standards.URI("..", "http://a/b/c/d;p?q"), "http://a/b/") test_equal((string)Standards.URI("../", "http://a/b/c/d;p?q"), "http://a/b/") test_equal((string)Standards.URI("../g", "http://a/b/c/d;p?q"), "http://a/b/g") test_equal((string)Standards.URI("../..", "http://a/b/c/d;p?q"), "http://a/") test_equal((string)Standards.URI("../../", "http://a/b/c/d;p?q"), "http://a/") test_equal((string)Standards.URI("../../g", "http://a/b/c/d;p?q"), "http://a/g")
+
test_equal((string)Standards.URI("", "http://a/b/c/d;p?q"), "http://a/b/c/d;p?q")
-
+
+
// RFC 3986 5.4.2 Abnormal Examples
test_equal((string)Standards.URI("../../../g", "http://a/b/c/d;p?q"), "http://a/g") test_equal((string)Standards.URI("../../../../g", "http://a/b/c/d;p?q"), "http://a/g") test_equal((string)Standards.URI("/./g", "http://a/b/c/d;p?q"), "http://a/./g") test_equal((string)Standards.URI("/../g", "http://a/b/c/d;p?q"), "http://a/../g") test_equal((string)Standards.URI("g.", "http://a/b/c/d;p?q"), "http://a/b/c/g.") test_equal((string)Standards.URI(".g", "http://a/b/c/d;p?q"), "http://a/b/c/.g") test_equal((string)Standards.URI("g..", "http://a/b/c/d;p?q"), "http://a/b/c/g..") test_equal((string)Standards.URI("..g", "http://a/b/c/d;p?q"), "http://a/b/c/..g") test_equal((string)Standards.URI("./../g", "http://a/b/c/d;p?q"), "http://a/b/g") test_equal((string)Standards.URI("./g/.", "http://a/b/c/d;p?q"), "http://a/b/c/g/") test_equal((string)Standards.URI("g/./h", "http://a/b/c/d;p?q"), "http://a/b/c/g/h") test_equal((string)Standards.URI("g/../h", "http://a/b/c/d;p?q"), "http://a/b/c/h") test_equal((string)Standards.URI("g;x=1/./y", "http://a/b/c/d;p?q"), "http://a/b/c/g;x=1/y") test_equal((string)Standards.URI("g;x=1/../y", "http://a/b/c/d;p?q"), "http://a/b/c/y") test_equal((string)Standards.URI("g?y/./x", "http://a/b/c/d;p?q"), "http://a/b/c/g?y/./x") test_equal((string)Standards.URI("g?y/../x", "http://a/b/c/d;p?q"), "http://a/b/c/g?y/../x") test_equal((string)Standards.URI("g#s/./x", "http://a/b/c/d;p?q"), "http://a/b/c/g#s/./x") test_equal((string)Standards.URI("g#s/../x", "http://a/b/c/d;p?q"), "http://a/b/c/g#s/../x") test_equal((string)Standards.URI("http:g", "http://a/b/c/d;p?q"), "http:g")
-
+
+
test_equal((string)Standards.URI("c?d=e", "http://a.b"), "http://a.b/c?d=e")
test_equal(Standards.URI("http://www.com/")->get_query_variables(),([])) test_equal(Standards.URI("http://www.com/?a=b")->get_query_variables(),(["a":"b"])) test_equal(Standards.URI("http://www.com/?a=b&a=b")->get_query_variables(),(["a":"b"])) test_equal(Standards.URI("http://www.com/?a=b&c")->get_query_variables(),(["a":"b","c":0])) test_equal(Standards.URI("http://www.com/?foo")->get_http_path_query(),"/?foo") test_equal(Standards.URI("http://www.com/?")->get_http_path_query(),"/?") test_equal(Standards.URI("http://www.com/")->get_http_path_query(),"/")
-
+
test_equal((string)Standards.URI("://"), "://")
+
test_equal((string)Standards.URI("/", "://"), ":///")
+
test_equal((string)Standards.URI("foo.bar", ":///"), ":///foo.bar")
+
test_equal(Standards.URI(":///foo/")->combine_uri_path("", "/foo/"), "/foo/")
test_eval_error(Standards.URI("www.com")) test_eq((string)Standards.URI("www.com","http://"),"http://www.com")
-
+
test_eq((string)Standards.URI("www.com/x?a=b#y","http://"),"http://www.com/x?a=b#y")
test_eq((string)Standards.URI("ftp://www.com/x?a=b#y","http://"),"ftp://www.com/x?a=b#y")
-
+
test_eq(Standards.URI("http://bloke@gmail.com@yahoo.com")->user, "bloke@gmail.com")
+
test_eq((string)Standards.URI("a", "file:"), "file:a")
+
test_eq((string)Standards.URI("a", "file:b"), "file:a")
+
test_eq((string)Standards.URI("a", "file:b/c"), "file:b/a")
+
test_eq((string)Standards.URI("a/b", "file:"), "file:a/b")
+
test_eq((string)Standards.URI("a/b", "file:c"), "file:a/b")
+
test_eq((string)Standards.URI("a/b", "file:c/d"), "file:c/a/b")
+
test_eq((string)Standards.URI("<a@example.com>", "mailto:"), "mailto:<a@example.com>")
// Some tests of empty path followed by a query. test_eq(Standards.URI("http://user:??@host?query")->query, "query")
-
+
test_eq(Standards.URI("http://user:??@host?query")->user, "user")
test_eq(Standards.URI("http://user:??@host?query")->password, "??") test_eq(Standards.URI("http://user:??@host?query")->path, "") test_eq(Standards.URI("HTTP://WWW.COM/")->scheme, "http") // test `== test_true(Standards.URI("a://b:c@d:1/e?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h"))
-
+
test_true(Standards.URI("a://b:c@d:1/e?f=g&h#i")==
+
Standards.URI("a://b:c@d:1/e?f=g&h#i"))
test_true(Standards.URI("A://b:c@D:01/e?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h")) test_false(Standards.URI("x://b:c@d:1/e?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h")) test_false(Standards.URI("a://x:c@d:1/e?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h")) test_false(Standards.URI("a://b:x@d:1/e?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h")) test_false(Standards.URI("a://b:c@x:1/e?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h")) test_false(Standards.URI("a://b:c@d:2/e?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h")) test_false(Standards.URI("a://b:c@d:1/x?f=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h")) test_false(Standards.URI("a://b:c@d:1/e?x=g&h")== Standards.URI("a://b:c@d:1/e?f=g&h"))
-
+
test_false(Standards.URI("a://b:c@d:1/e?f=g&h#i")==
+
Standards.URI("a://b:c@d:1/e?f=g&h#I"))
// codec
-
test_true(decode_value(encode_value(Standards.URI("a://b:c@d:1/e?f=g&h")))==
-
Standards.URI("a://b:c@d:1/e?f=g&h"))
+
test_true(decode_value(encode_value(Standards.URI("a://b:c@d:1/e?f=g&h
#i
")))==
+
Standards.URI("a://b:c@d:1/e?f=g&h
#i
"))
+
test_true(Standards.URI(Standards.URI("a://b:c@d:1/e?f=g&h#i"))==
+
Standards.URI("a://b:c@d:1/e?f=g&h#i"))
-
+
test_eval_error(Standards.URI("")) test_eval_error(Standards.URI("#foo")) test_eval_error(Standards.URI("/foo")) test_eval_error(Standards.URI("x_x:")) // - Standards.IDNA define([[test_punycode]], [[ test_eq([[Standards.IDNA.Punycode.encode($1)]], [[$2]]) test_eq([[Standards.IDNA.Punycode.decode($2)]], [[$1]])
pike.git/lib/modules/Standards.pmod/testsuite.in:223:
YXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIGfMA0GCSqGSIb3DQEBAQUAA4GN ADCBiQKBgQDlGb9to1ZhLZlIcfZn3rmN67eehoAKkQ76OCWvRoiC5XOooJskXQ0f zGVuDLDQVoQYh5oGmxChc9+0WDlrbsH2FdWoqD+qEgaNMax/sDTXjzRniAnNFBHi TkVWaR94AoDa3EeRKbs2yWNcxeDXLYd7obcysHswuiovMaruo2fa2wIDAQABMA0G CSqGSIb3DQEBBQUAA4GBAFgVKTk8d6PaXCUDfGD67gmZPCcQcMgMCeazh88K4hiW NWLMv5sneYlfycQJ9M61Hd8qveXbhpxoJeUwfLaJFf5n0a3hUKw8fGJLj7qE1xIV Gx/KXQ/BUpQqEZnae88MNhPVNdwQGVnqlMEAv3WP2fr9dgTbYruQagPZRjXZ+Hxb -----END CERTIFICATE-----"; object o = Standards.PEM.Message(pem); object t = Standards.X509.decode_certificate(o->body);
-
return ([ "der" : stringp(t->der), "version" : t->version, "serial":t->serial->digits(16), "algorithm":
sprintf("%O",
t->algorithm[0]
)
, "issuer":t->issuer[2][0][1]->value, "not_after":t->not_after, "not_before":t->not_before, "subject":t->subject[2][0][1]->value, "extensions":t->extensions])
+
return ([ "der" : stringp(t->der), "version" : t->version, "serial":t->serial->digits(16), "algorithm":t->algorithm[0], "issuer":t->issuer[2][0][1]->value, "not_after":t->not_after, "not_before":t->not_before, "subject":t->subject[2][0][1]->value, "extensions":t->extensions])
]],[[ ([ /* 9 elements */
-
"algorithm":
"
Standards.ASN1.Types.Identifier(1
.
2
.
840
.
113549
.
1
.
1
.
5)
"
,
+
"algorithm": Standards.ASN1.Types.Identifier(1
,
2
,
840
,
113549
,
1
,
1
,
5),
"der": 1, "issuer": "Class 1 Public Primary Certification Authority", "extensions": ([]),
-
"not_after":
1848866399
,
-
"not_before":
822870000
,
+
"not_after":
1848873599
,
+
"not_before":
822873600
,
"serial": "3f691e819cf09a4af373ffb948a2e4dd", "subject": "Class 1 Public Primary Certification Authority", "version": 1 ]) ]]) test_any_equal([[ object rsa = Crypto.RSA(); rsa->set_public_key(Gmp.mpz(10091719133288484609038014264477683817475840711323254929480453433408142690559279434827127011542800608968367637399409601909209406663819557863705925738798431), 65537); array attrs = ({ ([ "organizationName" : Standards.ASN1.Types.PrintableString("Test") ]), ([ "commonName" : Standards.ASN1.Types.PrintableString("*") ]), }); string c = Standards.X509.make_selfsigned_certificate(rsa, 3600*24*365, attrs, 0, 0, 5); object t = Standards.X509.decode_certificate(c);
-
return ([ "version" : t->version, "serial":t->serial->digits(16), "algorithm":
sprintf("%O",
t->algorithm[0]
)
, "issuer":t->issuer[0][0][1]->value, "subject":t->subject[0][0][1]->value, "extensions":
t->extensions
, "public_key":(int)t->public_key->
rsa
->public_key_equal(rsa) ])
+
mapping ext = t->extensions;
+
foreach(ext; string id; object value) ext[id]=value->get_der();
+
return ([
+
"version" : t->version,
+
"serial":t->serial->digits(16),
+
"algorithm":t->algorithm[0],
+
"issuer":t->issuer[0][0][1]->value,
+
"subject":t->subject[0][0][1]->value,
+
"extensions":
ext
,
+
"public_key":(int)t->public_key->
pkc
->public_key_equal(rsa)
,
+
"ext_bc" : t->ext_basicConstraints,
+
"ext_bc_ca" : t->ext_basicConstraints_cA,
+
"ext_bc_len" : t->ext_basicComnstraints_pathLenConstraint,
+
"ext_subkey" : t->ext_subjectKeyIdentifier,
+
"ext_ku" : t->ext_keyUsage,
+
])
]],[[ ([
-
"version" :
1
,
+
"version" :
3
,
"serial" : "5",
-
"algorithm":
"
Standards.ASN1.Types.Identifier(1
.
2
.
840
.
113549
.
1
.
1
.
11)
"
,
+
"algorithm": Standards.ASN1.Types.Identifier(1
,
2
,
840
,
113549
,
1
,
1
,
11),
"issuer" : "Test", "subject" : "Test",
-
"extensions" : ([]),
+
"extensions" : ([
+
Standards.ASN1.Types.Identifier(2,5,29,14): "\4\24\214\366\177.l>\273\345\317\361z\262""4\366.\264\346B|K",
+
Standards.ASN1.Types.Identifier(2,5,29,15): "\3\2\5\240",
+
Standards.ASN1.Types.Identifier(2,5,29,19): "0\0"
+
]),
"public_key": 1,
-
+
"ext_bc" : 1,
+
"ext_bc_ca" : 0,
+
"ext_bc_len" : 0,
+
"ext_subkey" : "\214\366\177.l>\273\345\317\361z\262""4\366.\264\346B|K",
+
"ext_ku" : Standards.X509.KU_digitalSignature|Standards.X509.KU_keyEncipherment,
]) ]])
-
+
test_any_equal([[
+
object rsa = Crypto.RSA();
+
rsa->set_public_key(Gmp.mpz(10091719133288484609038014264477683817475840711323254929480453433408142690559279434827127011542800608968367637399409601909209406663819557863705925738798431), 65537);
+
+
array attrs = ({
+
([ "organizationName" : Standards.ASN1.Types.PrintableString("Test") ]),
+
([ "commonName" : Standards.ASN1.Types.PrintableString("*") ]),
+
});
+
+
string c = Standards.X509.make_root_certificate(rsa, 3600*24*365, attrs, 0, 0, 5);
+
+
object t = Standards.X509.decode_certificate(c);
+
return ([
+
"ext_bc" : t->ext_basicConstraints,
+
"ext_bc_ca" : t->ext_basicConstraints_cA,
+
"ext_bc_len" : t->ext_basicComnstraints_pathLenConstraint,
+
"ext_ku" : t->ext_keyUsage,
+
])
+
]],[[ ([
+
"ext_bc" : 1,
+
"ext_bc_ca" : 1,
+
"ext_bc_len" : 0,
+
"ext_ku" : Standards.X509.KU_keyCertSign|Standards.X509.KU_cRLSign,
+
]) ]])
+
test_any([[ Crypto.DSA dsa = Crypto.DSA(); dsa->generate_key(1024,160); foreach( ({ 0, Crypto.SHA1, #if constant(Crypto.SHA224) Crypto.SHA224, #endif Crypto.SHA256 }), object h) {
pike.git/lib/modules/Standards.pmod/testsuite.in:303:
#endif }), object h) { string s=Standards.X509.make_selfsigned_certificate(rsa, 3600, ([ "commonName":"*" ]), 0, h); if( !Standards.X509.verify_certificate(s, ([])) ) return h; } return 1; ]], 1)
+
cond_resolv( Crypto.ECC, [[
+
test_any([[
+
Crypto.Sign key = Crypto.ECC.SECP_521R1.ECDSA()->generate_key();
-
+
foreach( ({ 0,
+
Crypto.SHA1,
+
#if constant(Crypto.SHA224)
+
Crypto.SHA224,
+
#endif
+
Crypto.SHA256,
+
#if constant(Crypto.SHA384)
+
Crypto.SHA384,
+
#endif
+
#if constant(Crypto.SHA512)
+
Crypto.SHA512,
+
#endif
+
}), object h)
+
{
+
string s = Standards.X509.make_selfsigned_certificate(key, 3600, ([ "commonName":"*" ]), 0, h);
+
if( !Standards.X509.verify_certificate(s, ([])) )
+
return h;
+
}
+
return 1;
+
]], 1)
+
]])
+
+
test_any([[
+
Crypto.RSA root_rsa = Crypto.RSA();
+
root_rsa->generate_key(512);
+
string root = Standards.X509.make_root_certificate(root_rsa, 3600, ([ "commonName":"DaRoot" ]));
+
object rtbs = Standards.X509.decode_certificate(root);
+
+
Crypto.RSA cert_rsa = Crypto.RSA();
+
cert_rsa->generate_key(512);
+
string c = Standards.X509.make_site_certificate(rtbs, root_rsa, cert_rsa, 3600, ([ "commonName":"*" ]));
+
+
mapping auths = ([ rtbs->subject->get_der() : rtbs->public_key ]);
+
+
mapping m = Standards.X509.verify_certificate_chain( ({ c }), auths, 1);
+
if(!m->verified || m->error_code || m->self_signed)
+
return m+(["line":__LINE__]);
+
+
c = Standards.X509.make_selfsigned_certificate(cert_rsa, 3600, ([ "commonName":"*" ]));
+
m = Standards.X509.verify_certificate_chain( ({ c }), auths, 1);
+
if(m->verified || m->error_code!=Standards.X509.CERT_ROOT_UNTRUSTED)
+
return m+(["line":__LINE__]);
+
+
c = Standards.X509.make_site_certificate(rtbs, root_rsa, cert_rsa, -3600, ([ "commonName":"*" ]));
+
m = Standards.X509.verify_certificate_chain( ({ c }), auths, 1);
+
if(m->verified || m->error_code!=Standards.X509.CERT_TOO_OLD)
+
return m+(["line":__LINE__]);
+
+
{
+
object dn = Standards.PKCS.Certificate.build_distinguished_name(
+
([ "commonName" : "*" ]) );
+
object val = Standards.ASN1.Types.Sequence( ({
+
Standards.ASN1.Types.UTC()->set_posix( time()+1000 ),
+
Standards.ASN1.Types.UTC()->set_posix( time()+2000 ),
+
}) );
+
object tbs = Standards.X509.make_tbs(rtbs->subject,
+
cert_rsa->pkcs_signature_algorithm_id(Crypto.SHA256),
+
dn, cert_rsa->pkcs_public_key(),
+
Standards.ASN1.Types.Integer(1), val, 0);
+
c = Standards.X509.sign_tbs(tbs, root_rsa, Crypto.SHA256)->get_der();
+
}
+
m = Standards.X509.verify_certificate_chain( ({ c }), auths, 1);
+
if(m->verified || m->error_code!=Standards.X509.CERT_TOO_NEW)
+
return m+(["line":__LINE__]);
+
+
return 1;
+
]], 1)
+
+
test_true(mappingp(Standards.X509.load_authorities()))
+
define(test_cert, ([[
-
test_true(Standards.X509.verify_certificate(Standards.PEM.Messages(#"$1")->parts->CERTIFICATE->body, ([])))
+
test_true(Standards.X509.verify_certificate(Standards.PEM.Messages(#"$1")->parts->CERTIFICATE
[0]
->body, ([])))
+
test_any([[
+
string der = Standards.PEM.Messages(#"$1")->get_certificate();
+
object o = decode_value(encode_value(Standards.X509.decode_certificate(der)));
+
/* TBS does not contain the full certificate... */
+
/* if( o->get_der() != der ) return -1; */
+
+
if( o->ext_basicConstraints != 1) return 2;
+
if( !o->public_key->pkc ) return 3;
+
return 1;
+
]], 1)
]])) dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -md5 -newkey rsa:2048 -out certfile.cer test_cert(-----BEGIN CERTIFICATE----- MIIC+TCCAeGgAwIBAgIJAK9S+nXAkU+DMA0GCSqGSIb3DQEBBAUAMBMxETAPBgNV BAMMCFBpa2VDZXJ0MB4XDTEzMTEyMTIxMjM1MFoXDTE0MTEyMTIxMjM1MFowEzER MA8GA1UEAwwIUGlrZUNlcnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDacxSu60OEhmtfBd+p9oaQ+4w13Cwp70dwRrjPb/y33sFWKN3YZ+rq/8aNXPUO GLOyVF6z/BlOBS8t6KBI6lNvozVFqp5cwjA6vncbwMODqB8ZZffgA/dbSTM/xtbb CSno4ylr4wLVk1tnwZIOS4F2mIR/po1QzwIqTAGdkMEvUkmknqEM2Ifqdb6pNjWh
pike.git/lib/modules/Standards.pmod/testsuite.in:349:
MoaBbbusDfjNHjAfBgNVHSMEGDAWgBT2CgtRG0/MHJwJMoaBbbusDfjNHjAMBgNV HRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQClIqFapK5qFrAs0hvcHBBnHofn zOe/+w6iEDfZfDr0HPnJ82ud/jze1h5oqWOjfVJxU1uerexr1zY9CAw02r5lbPDY MQpq+dh+QEl47TXmfPRLhP1VDrhf4imZRiOBy7VMXJ9ry3VixclN3nkntcx3SbB9 Qo2hMzbvtyF1uleBIyZhECN4THU5O2+FDwFOX4ZQGxQK/ANCNDN1rCAb5ndcYcKk sMC/92tm3x5q8EHS1Yil4Q8BIiuj+2psKX9UZGAbMxB1czubQkyl9mNiV9V8PpGc Vue27gwE5EFxe0/5NwQmjkyH6xD6KQx71T1pRdLr8MiAD1YhPsXx61VkDgtm -----END CERTIFICATE-----) dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha384 -newkey rsa:2048 -out certfile.cer
+
cond_resolv(Crypto.SHA384, [[
test_cert(-----BEGIN CERTIFICATE----- MIIC+TCCAeGgAwIBAgIJAL7hTIcdxBC2MA0GCSqGSIb3DQEBDAUAMBMxETAPBgNV BAMMCFBpa2VDZXJ0MB4XDTEzMTExOTEzNDkyMFoXDTE0MTExOTEzNDkyMFowEzER MA8GA1UEAwwIUGlrZUNlcnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDrtRukBd5IMIJiKYDDnPYKOyxL1prfDZQK7imVUaPaJ7nFC4xEAdmslALwqatl u17imWe/cVeL6Hrk6hfpbIIKTD21JaJDIeSfdBhnB5PrRrf2t7w7i9ycP17tPc+X f24OIJLdSnG8hIhFfFF3ycKSAP95C6o+bMufPcHfbo4krDRC6sH9CmYjzTad7yLd 5XZxQDZWzVrEGPDBqICie4dxXr3Z8cGaX8K0yJ/EcRit4JJ0DCEjqw5VzAcp0Ueb 7cJBqR3RdjICfEzIk9b7JRGCxfzYdInE6lFdiz+qD7oZfKnLqJnxa0Bko5p7dLNl 68AB0PhdSPlf/+OCq/CORVNvAgMBAAGjUDBOMB0GA1UdDgQWBBRrbb+EgxdZHmib f6S9MXaLlz6gbjAfBgNVHSMEGDAWgBRrbb+EgxdZHmibf6S9MXaLlz6gbjAMBgNV HRMEBTADAQH/MA0GCSqGSIb3DQEBDAUAA4IBAQBA/Bi+wAm4gvb2nQ2krHRX9Mqn /shpH9ac3XtaZqTxcgmQngCWJCalYetHIwyTghMijDfwZv4fVx2I7Ss9Ay3rB5a0 EocTN81NI3zQ7tCXvh99lEKXkZ0SwYdCHRFOr3C7yadoFRrXFOkjKKkv44AZptc6 dddT4IhF0ccFNVops9yUkgdiSaZL+iWBKzPxNSP2m785ldzfpAaBfkIjtQm0LUtP Mc8wNpKQCO3ldK2Paq+At0aaPXlRVIUtS9/w0MYL90w/3iDzR3OtTvb85I87G3A1 xuStSBwdb6EpBU2Ige9qw5TVaulCBjAmdOUIJRwU5UoWTktcmrsM0aqjf+/R -----END CERTIFICATE-----)
-
+
]])
dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha512 -newkey rsa:2048 -out certfile.cer
-
+
cond_resolv(Crypto.SHA512, [[
test_cert(-----BEGIN CERTIFICATE----- MIIC+TCCAeGgAwIBAgIJANPdhgZsaxbZMA0GCSqGSIb3DQEBDQUAMBMxETAPBgNV BAMMCFBpa2VDZXJ0MB4XDTEzMTExOTEzNTg1M1oXDTE0MTExOTEzNTg1M1owEzER MA8GA1UEAwwIUGlrZUNlcnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQCh38qv4Sycmsg7mWX3uH5yV+lBcu9YK1Mr2RxomZ3Qmh0SNWHkUqySXZ6UAgy/ rptf938jqtEm3XQ6BRwjGqcSjoPo0IaE/Zm3LmJHf0vDEckn0pz8yA5gXHVxVxlL M40VtTH+LYrW8ZagwUUj2KppZSbWC91JJ61l8hody8zEIiwhm4Y4G2FYhFZZNPGK btEL6cJCoFplkocWjHidnW2X33EGrY5vtp5W3bGbpzfxKjSAZVDGiCbfnam7GrhU 8jDWpZEaCPiFVT2hY5Hz509FQlZpyOqzjhgfQPU5bGWphBzHpnma3ehvATdo5tjE yHNXJLtlBR31ysfSHWUilvNhAgMBAAGjUDBOMB0GA1UdDgQWBBTlPPi9ZZPq3quZ R6kgGV/jitgxPjAfBgNVHSMEGDAWgBTlPPi9ZZPq3quZR6kgGV/jitgxPjAMBgNV HRMEBTADAQH/MA0GCSqGSIb3DQEBDQUAA4IBAQBe5mgQx+xZFZ48nNLJCUhNxpM4 1Z9ru0SM/aQwQOHm6Ewhg89E2VjbvefqhdPkNF6hQTLsjcF3hh0oxDI4pXQE4QFK ouS5lbSm8PGjSG9XmFu1j8wcO7XhgOxEnV+7aTtD0SbRogsxAKoeV2eINcWYbJp7 aCBpDINBOdGmnLiBxN1x9Q7EPP3pLbba1/bo2Od3ptd3GWUlmoufjuLezgSRni52 9lj8H5z7G8tvU2OZKYHI6y3n5Q6SUh+LRUAwYnKaO54WVsjO6oA6DD0Z6HovzQfN AWbDAMbePGe4sM6h5f3MO/v3Wbxkv1scn2PuvHQ1xpTfp7z+yAc8kB4udUnC -----END CERTIFICATE-----)
-
+
]])
dnl openssl dsaparam -genkey -out dsaparam 1024 dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha1 -newkey dsa:dsaparam.txt -out certfile.cer test_cert(-----BEGIN CERTIFICATE----- MIICszCCAnGgAwIBAgIJAOthAQ79O7mMMAkGByqGSM44BAMwEzERMA8GA1UEAwwI UGlrZUNlcnQwHhcNMTMxMTE5MTc0MDIwWhcNMTQxMTE5MTc0MDIwWjATMREwDwYD VQQDDAhQaWtlQ2VydDCCAbYwggErBgcqhkjOOAQBMIIBHgKBgQC6vqxjXhAMZSEV P4pzp0KY+qYnTjM9ieZ27myet+M5qXIjcEg2/XLwLPmPIYOGTm6OlPXADdaEZzOf j6RLB2PJD6GghC5NbdrewsgGMAuVM7h5uEXRswsbpwxFm2MuPqKtA699cs6fa5hZ pNZUQPSlrFfkb6/95s/EofMGMQgQmwIVAPUBXOFLS/MYisyLR0Yw/poPC3HlAoGA
pike.git/lib/modules/Standards.pmod/testsuite.in:409:
AtOD//jnVOjijOG6fnAfBxMkkKWKYojMcDYWsijI6nYDgYQAAoGAWocMqiSNXmuc wIfYetPQitrmZRDTWizuit/sIcmvIPM0OnqFcxp50QWOaiZmAuL3pEB4CiV2HpIS Rer5N3/Vp+zMQGgRM1zFKD2qbdmMTOMWUGc3g1AjGGFvDuTYGOIY4RmftR0gt8Y4 E2Dqqk0XbF3CeCrVhmVfa7ej0ByVYhmjUDBOMB0GA1UdDgQWBBRjbUSrAPUt1p8i 8PfVzFv4Dl03LjAfBgNVHSMEGDAWgBRjbUSrAPUt1p8i8PfVzFv4Dl03LjAMBgNV HRMEBTADAQH/MAkGByqGSM44BAMDMQAwLgIVALDFfQRihjOCqi1vFUi5rnYig/zk AhUAijRxsj+Q6LEF43H8Wq4quhnZ5wQ= -----END CERTIFICATE-----) dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha224 -newkey dsa:dsaparam.txt -out certfile.cer
+
cond_resolv(Crypto.SHA224, [[
test_cert(-----BEGIN CERTIFICATE----- MIICtzCCAnSgAwIBAgIJAOX731WMZ8z4MAsGCWCGSAFlAwQDATATMREwDwYDVQQD DAhQaWtlQ2VydDAeFw0xMzExMjEyMjQ4MzlaFw0xNDExMjEyMjQ4MzlaMBMxETAP BgNVBAMMCFBpa2VDZXJ0MIIBtzCCASsGByqGSM44BAEwggEeAoGBALq+rGNeEAxl IRU/inOnQpj6pidOMz2J5nbubJ634zmpciNwSDb9cvAs+Y8hg4ZObo6U9cAN1oRn M5+PpEsHY8kPoaCELk1t2t7CyAYwC5UzuHm4RdGzCxunDEWbYy4+oq0Dr31yzp9r mFmk1lRA9KWsV+Rvr/3mz8Sh8wYxCBCbAhUA9QFc4UtL8xiKzItHRjD+mg8LceUC gYASp3JVINlEswI40dztRc1gx5w5WClzLxb0MSDhh9PHpIyn8TLWZcb9y+8fjs1s g1J/zxBesG4kkTOGdCKv4BSHfUyPar9TLZYo/wg/6QkY2O0W7HI7phnHY4Bz2Uet 29sC04P/+OdU6OKM4bp+cB8HEySQpYpiiMxwNhayKMjqdgOBhQACgYEAl2nhlto4 OVVC6LL3dbTDzuPoGTPXrc/O79rgN+Tqk6xyDZp8OCsv3iCixFQSuEzB1FYtpRW6 h88BtW+XQLwXDtnutMB5f7XxsmUl4bBAQtsgsj8zDLXeZwW2asJx4lNUChLy4ugI fHbiv2c0tG/ehdl7/5oWeWfTJ8W++DdOChqjUDBOMB0GA1UdDgQWBBSxIQL2L5SV hXWv/TjSQJyMjDyj9jAfBgNVHSMEGDAWgBSxIQL2L5SVhXWv/TjSQJyMjDyj9jAM BgNVHRMEBTADAQH/MAsGCWCGSAFlAwQDAQMwADAtAhUAiaubShILTT032QiN0839 FjXjMH4CFG58nH+vm7Sm19iEmkyAIuxCSWLt -----END CERTIFICATE-----)
-
+
]])
dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha256 -newkey dsa:dsaparam.txt -out certfile.cer test_cert(-----BEGIN CERTIFICATE----- MIICtjCCAnOgAwIBAgIJAKNFDJCk2PapMAsGCWCGSAFlAwQDAjATMREwDwYDVQQD DAhQaWtlQ2VydDAeFw0xMzExMjEyMjUzMTFaFw0xNDExMjEyMjUzMTFaMBMxETAP BgNVBAMMCFBpa2VDZXJ0MIIBtjCCASsGByqGSM44BAEwggEeAoGBALq+rGNeEAxl IRU/inOnQpj6pidOMz2J5nbubJ634zmpciNwSDb9cvAs+Y8hg4ZObo6U9cAN1oRn M5+PpEsHY8kPoaCELk1t2t7CyAYwC5UzuHm4RdGzCxunDEWbYy4+oq0Dr31yzp9r mFmk1lRA9KWsV+Rvr/3mz8Sh8wYxCBCbAhUA9QFc4UtL8xiKzItHRjD+mg8LceUC gYASp3JVINlEswI40dztRc1gx5w5WClzLxb0MSDhh9PHpIyn8TLWZcb9y+8fjs1s g1J/zxBesG4kkTOGdCKv4BSHfUyPar9TLZYo/wg/6QkY2O0W7HI7phnHY4Bz2Uet 29sC04P/+OdU6OKM4bp+cB8HEySQpYpiiMxwNhayKMjqdgOBhAACgYBTJAHvGtEO 7GSzGTozkjxnZo26ihiYsiIHiC1oD4VJd9l0Vu223QXVOgAuJtzgTOxZfFQB6Miq KugJ+2qcmykLcNG5TTHUkJ1HKYhuP1iiYUMY97Q1b2Uz+MOQ+shimvXdoK+9ZBOf 5a2tZDCYLAI1xdF6A35C0wSZiT78yP8BhKNQME4wHQYDVR0OBBYEFCWcSXcij0Vj Zt8leQB4DR+YGM+qMB8GA1UdIwQYMBaAFCWcSXcij0VjZt8leQB4DR+YGM+qMAwG A1UdEwQFMAMBAf8wCwYJYIZIAWUDBAMCAzAAMC0CFQDQLFyJApRqu2RgJrpDBNBp m7GVvwIUYpUR6uKR45jxvAgL6W4yvRRP7vI= -----END CERTIFICATE-----)
-
+
dnl openssl ecparam -out ec_key.pem -name prime192v1 -genkey
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha1 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_192R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBSzCCAQKgAwIBAgIJAMj9iSOoOhP/MAkGByqGSM49BAEwEzERMA8GA1UEAwwI
+
UGlrZUNlcnQwHhcNMTQwMjIwMjMwMzUwWhcNMTUwMjIwMjMwMzUwWjATMREwDwYD
+
VQQDDAhQaWtlQ2VydDBJMBMGByqGSM49AgEGCCqGSM49AwEBAzIABO8Nc4TWmi6n
+
SOzblmAc9JFj5bDpmh9d93iHQUQIAUZ7LNTKv1V9tTNM+jZAYrr/+6NQME4wHQYD
+
VR0OBBYEFEedlGtZ8r6IqvFJyZz2bTGgo0wIMB8GA1UdIwQYMBaAFEedlGtZ8r6I
+
qvFJyZz2bTGgo0wIMAwGA1UdEwQFMAMBAf8wCQYHKoZIzj0EAQM4ADA1AhkA0FYQ
+
k2RmcnzBakhpsxneFHHW1zYIKmBIAhgDcmopMyY+DdGfY1PyjZQAMK6wd2apnxA=
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl ecparam -out ec_key.pem -name secp224r1 -genkey
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha1 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_224R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBWTCCAQegAwIBAgIJAKy2vVL0uZPvMAkGByqGSM49BAEwEzERMA8GA1UEAwwI
+
UGlrZUNlcnQwHhcNMTQwMjIwMjIyODEzWhcNMTUwMjIwMjIyODEzWjATMREwDwYD
+
VQQDDAhQaWtlQ2VydDBOMBAGByqGSM49AgEGBSuBBAAhAzoABLBH4yk4C3aO0tsM
+
zek5hOHT4QTLT0JXN6ISNcMKqUCRVKpCvGSzeEXNJxapMiYWHdjLYD+4JVrxo1Aw
+
TjAdBgNVHQ4EFgQUjokv7Vc49VVyQxypwozb6K2WmsgwHwYDVR0jBBgwFoAUjokv
+
7Vc49VVyQxypwozb6K2WmsgwDAYDVR0TBAUwAwEB/zAJBgcqhkjOPQQBA0EAMD4C
+
HQC2JfGfDizRP3ZHxaoZghBK/7dnHcT322QuFR6iAh0A4LJK8jnqAMRI0PD1JKDm
+
dfPFb1cNwHMDje6/kw==
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha224 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_224R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBWjCCAQigAwIBAgIJAOha9wA3a+TQMAoGCCqGSM49BAMBMBMxETAPBgNVBAMM
+
CFBpa2VDZXJ0MB4XDTE0MDIyMDIyNTMxNVoXDTE1MDIyMDIyNTMxNVowEzERMA8G
+
A1UEAwwIUGlrZUNlcnQwTjAQBgcqhkjOPQIBBgUrgQQAIQM6AASwR+MpOAt2jtLb
+
DM3pOYTh0+EEy09CVzeiEjXDCqlAkVSqQrxks3hFzScWqTImFh3Yy2A/uCVa8aNQ
+
ME4wHQYDVR0OBBYEFI6JL+1XOPVVckMcqcKM2+itlprIMB8GA1UdIwQYMBaAFI6J
+
L+1XOPVVckMcqcKM2+itlprIMAwGA1UdEwQFMAMBAf8wCgYIKoZIzj0EAwEDQAAw
+
PQIdALIF/yYyUXiMvY8wEkBrtXpksqsfDqrWALd7U1ACHGaRu/84qvnQwzyAvl+j
+
b5Z/So1yqBUf4XBq0Es=
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha256 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_224R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBWjCCAQigAwIBAgIJAJPEMg5QZ2AoMAoGCCqGSM49BAMCMBMxETAPBgNVBAMM
+
CFBpa2VDZXJ0MB4XDTE0MDIyMDIyNTQzOFoXDTE1MDIyMDIyNTQzOFowEzERMA8G
+
A1UEAwwIUGlrZUNlcnQwTjAQBgcqhkjOPQIBBgUrgQQAIQM6AASwR+MpOAt2jtLb
+
DM3pOYTh0+EEy09CVzeiEjXDCqlAkVSqQrxks3hFzScWqTImFh3Yy2A/uCVa8aNQ
+
ME4wHQYDVR0OBBYEFI6JL+1XOPVVckMcqcKM2+itlprIMB8GA1UdIwQYMBaAFI6J
+
L+1XOPVVckMcqcKM2+itlprIMAwGA1UdEwQFMAMBAf8wCgYIKoZIzj0EAwIDQAAw
+
PQIdALQKF7WnOEjWGfCEwsJu4H7TleWwjBdSQhZSHHACHFzkyw1hf7mI05liXDoB
+
kgzS9dNkRDh/CNvJidE=
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha384 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_224R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBWjCCAQigAwIBAgIJALahVk/hu/hnMAoGCCqGSM49BAMDMBMxETAPBgNVBAMM
+
CFBpa2VDZXJ0MB4XDTE0MDIyMDIyNTU0NFoXDTE1MDIyMDIyNTU0NFowEzERMA8G
+
A1UEAwwIUGlrZUNlcnQwTjAQBgcqhkjOPQIBBgUrgQQAIQM6AASwR+MpOAt2jtLb
+
DM3pOYTh0+EEy09CVzeiEjXDCqlAkVSqQrxks3hFzScWqTImFh3Yy2A/uCVa8aNQ
+
ME4wHQYDVR0OBBYEFI6JL+1XOPVVckMcqcKM2+itlprIMB8GA1UdIwQYMBaAFI6J
+
L+1XOPVVckMcqcKM2+itlprIMAwGA1UdEwQFMAMBAf8wCgYIKoZIzj0EAwMDQAAw
+
PQIcQ9LlOcOtKZlTqZiH8mLYT2aR61dFcAdqxqpRXQIdAK9x8HwlpDIoDn/BI1mC
+
XRYzQ3xFhbfJ8HcxTbw=
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha512 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_224R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBWjCCAQigAwIBAgIJAIDLkTGU0TRQMAoGCCqGSM49BAMEMBMxETAPBgNVBAMM
+
CFBpa2VDZXJ0MB4XDTE0MDIyMDIyNTcwNVoXDTE1MDIyMDIyNTcwNVowEzERMA8G
+
A1UEAwwIUGlrZUNlcnQwTjAQBgcqhkjOPQIBBgUrgQQAIQM6AASwR+MpOAt2jtLb
+
DM3pOYTh0+EEy09CVzeiEjXDCqlAkVSqQrxks3hFzScWqTImFh3Yy2A/uCVa8aNQ
+
ME4wHQYDVR0OBBYEFI6JL+1XOPVVckMcqcKM2+itlprIMB8GA1UdIwQYMBaAFI6J
+
L+1XOPVVckMcqcKM2+itlprIMAwGA1UdEwQFMAMBAf8wCgYIKoZIzj0EAwQDQAAw
+
PQIcU0QhBUpHiMyHO5CbDrUhHralI2PsWJ3uxdVQqAIdAJqfn4ZOA1GL7GS8M/qz
+
Nsv1aJAwJPuGLiymoU4=
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl ecparam -out ec_key.pem -name prime256v1 -genkey
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha1 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_256R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBazCCARKgAwIBAgIJAM1x4Mn082OeMAkGByqGSM49BAEwEzERMA8GA1UEAwwI
+
UGlrZUNlcnQwHhcNMTQwMjIwMjMwNTU4WhcNMTUwMjIwMjMwNTU4WjATMREwDwYD
+
VQQDDAhQaWtlQ2VydDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIJ+nZxoPPQM
+
MJnOyOrDX7WSy6bHc9N5nR4yresTNgnQUlXTP8Ew3RcVpNlfAHhqzCvw7O7KTQ/1
+
KTkQi3ad7y6jUDBOMB0GA1UdDgQWBBQdqJlyddJwwi0zmnidBkWzO1+LezAfBgNV
+
HSMEGDAWgBQdqJlyddJwwi0zmnidBkWzO1+LezAMBgNVHRMEBTADAQH/MAkGByqG
+
SM49BAEDSAAwRQIgPKBNFDgNeKuPxrXy4s8JK8IUxMjm9IopfE83FwtS090CIQC9
+
+0YHz9XhIlDO/P/M/C8MN0B7UMclhORDsUwuB7UWNg==
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl ecparam -out ec_key.pem -name secp384r1 -genkey
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha1 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_384R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIBqDCCAS+gAwIBAgIJANvhD1nHQbI5MAkGByqGSM49BAEwEzERMA8GA1UEAwwI
+
UGlrZUNlcnQwHhcNMTQwMjIwMjI1OTIyWhcNMTUwMjIwMjI1OTIyWjATMREwDwYD
+
VQQDDAhQaWtlQ2VydDB2MBAGByqGSM49AgEGBSuBBAAiA2IABBt1/QmpRtdKGu7Q
+
79jLjyqjoq8srnaXIWQLLxHO42BwvXEprey0Jfpw0ckTkDjc7i6949Bbp0nGz/7i
+
t5+AGxwXvoGkqbJnChlAEyFfKnQCd6mTmdJ2TSpR9OZcvwV0UaNQME4wHQYDVR0O
+
BBYEFDyKXEk69swxYjAw5/CIEprBAyvzMB8GA1UdIwQYMBaAFDyKXEk69swxYjAw
+
5/CIEprBAyvzMAwGA1UdEwQFMAMBAf8wCQYHKoZIzj0EAQNoADBlAjEA+T1yj7A3
+
nj6PzbohEjh9Tu6yMrCw2bgPVli5WNzuu19/zTfx+DWtt/18ULG4X54oAjAlQTnu
+
sO5NVHxzBVp4KKpeSo+GYCAxRVgYGWk5OSvNtM7ymVmcMXtzg18atpBaMaw=
+
-----END CERTIFICATE-----)
+
]])
+
+
dnl openssl ecparam -out ec_key.pem -name secp521r1 -genkey
+
dnl openssl req -new -key ec_key.pem -x509 -nodes -days 365 -subj "/CN=PikeCert" -sha1 -out cert.pem
+
cond_resolv(Crypto.ECC.SECP_521R1, [[
+
test_cert(-----BEGIN CERTIFICATE-----
+
MIIB8jCCAVWgAwIBAgIJANiMssVQFtzxMAkGByqGSM49BAEwEzERMA8GA1UEAwwI
+
UGlrZUNlcnQwHhcNMTQwMjIwMjMwMDQ1WhcNMTUwMjIwMjMwMDQ1WjATMREwDwYD
+
VQQDDAhQaWtlQ2VydDCBmzAQBgcqhkjOPQIBBgUrgQQAIwOBhgAEAZIjDKupLtSo
+
n+rHVD685yCjuYzkEurcuxoPXFNqQ445BRj5FcV3o9+YtFUGTr+Zyr0A083x3khS
+
A4/ztz7jzIqWAFWj0tFeckWNxxYbl4zIPaTIsSLV+EZhhpia6OoYtzKQeIN8NwI2
+
RNC2IzEe9kxFPOJ6A2FNqWojevI1eGSS9nUBo1AwTjAdBgNVHQ4EFgQU+71Yb0C9
+
d8sIZnqP7UrREpyyqEkwHwYDVR0jBBgwFoAU+71Yb0C9d8sIZnqP7UrREpyyqEkw
+
DAYDVR0TBAUwAwEB/zAJBgcqhkjOPQQBA4GLADCBhwJBS1pKdJcRD10CL+hvzbfZ
+
CyfO2yKeE5wCOnw4OKhKAUkNXyG4yNUeTu4DERxiu7NmS7dIPiOF4/EuN48yUu5o
+
oYwCQgEl0Y76aF2udd6/IP2kSHonzmWyspaD77/N1cBlkJ95ztgZQZw+EquafiCV
+
1osuk7lVUdguih1HssW1BjTkGeD4+g==
+
-----END CERTIFICATE-----)
+
]])
+
END_MARKER