mirror of
https://github.com/curl/curl.git
synced 2026-04-11 12:01:42 +08:00
runtests: generate certs dynamically, bump to EC-256, tidy up
Before this patch the curl repository and source tarball distribution contained test certificates as binary blobs. Used by runtests. Drop these certificates in favor of generating them dynamically as part of the build process. Both via autotools and CMake. As part of this, improve certificates, the generator script and process, file layout, and fix any issue to make it work fast and smooth both in CI and local builds. Note, cert generator scripts require OpenSSL >=1.0.2 (or LibreSSL >=3.1.0). Generation requires POSIX shell, also with CMake. Without a POSIX shell tests relying on TLS (and stunnel) will fail. Details: - build: generate certs as part of the test run process. - build, tests: generate certs in the build directory. - binarycheck: drop concept of known binary files with hashes. - binarycheck: move binary check logic into spacecheck and drop this separate checker tool. - build: fix to clean all cert files. - autotools: fix to not run leaf cert generators in parallel. To avoid confusion when updating the revocation database and counter. - scripts: drop `scripts` subdir, merge two scripts into one, auto-generate root cert, allow generating multiple leafs at once. - scripts: switch to EC-256 keys (was: RSA-2048). For key size and perf. - scripts: drop `-x` echo, text dumps, most other output. To avoid log noise and make it quicker in CI. - scripts: make it non-RSA-specific. - scripts: delete unused code. - scripts: use POSIX shell shebang. Some envs don't have bash (Alpine). - scripts: pass test pseudo-secrets via the command-line. To avoid: ``` + openssl genrsa -out test-ca.key -passout fd:0 2048 Invalid password argument, starting with "fd:" ``` - cmake: fix to launch generator scripts via the detected POSIX shell. - cmake: fix `build-certs` rule to not depend on `SRPFILES` (`srp-verifier-*`). - cmake: drop `EXCLUDE_FROM_ALL` for the cert subdir. It makes the Visual Studio generator miss to create the `clean-certs`, `build-certs` targets. No target depend on them, so they don't execute implicitly anyway. Fixes: ``` MSBUILD : error MSB1009: Project file does not exist. Switch: clean-certs.vcxproj ``` - cmake: add `VERBATIM USES_TERMINAL` to `build-certs` target. - GHA/linux: install openssl on Alpine, for the cert generator scripts. Follow-up to556f722fe3#16593 Follow-up tofa461b4eff#14486 Closes #16824
This commit is contained in:
parent
1821ea8b14
commit
44341e736a
115
.github/scripts/binarycheck.pl
vendored
115
.github/scripts/binarycheck.pl
vendored
@ -1,115 +0,0 @@
|
||||
#!/usr/bin/env perl
|
||||
#***************************************************************************
|
||||
# _ _ ____ _
|
||||
# Project ___| | | | _ \| |
|
||||
# / __| | | | |_) | |
|
||||
# | (__| |_| | _ <| |___
|
||||
# \___|\___/|_| \_\_____|
|
||||
#
|
||||
# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
#
|
||||
# This software is licensed as described in the file COPYING, which
|
||||
# you should have received as part of this distribution. The terms
|
||||
# are also available at https://curl.se/docs/copyright.html.
|
||||
#
|
||||
# You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||||
# copies of the Software, and permit persons to whom the Software is
|
||||
# furnished to do so, under the terms of the COPYING file.
|
||||
#
|
||||
# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||||
# KIND, either express or implied.
|
||||
#
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
|
||||
# This scripts scans the entire git repository for binary files.
|
||||
#
|
||||
# All files in the git repo that contain signs of being binary are then
|
||||
# collected and a sha256sum is generated for all of them. That summary is then
|
||||
# compared to the list of pre-vetted files so that only the exact copies of
|
||||
# already scrutinized files are deemed okay to "appear binary".
|
||||
#
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
my $root = ".";
|
||||
my $sumsfile = ".github/scripts/binarycheck.sums";
|
||||
if($ARGV[0]) {
|
||||
$root = $ARGV[0];
|
||||
}
|
||||
|
||||
my @bin;
|
||||
my %known;
|
||||
my $error = 0;
|
||||
|
||||
sub knownbins {
|
||||
open(my $mh, "<", "$sumsfile") ||
|
||||
die "can't read known binaries";
|
||||
while(<$mh>) {
|
||||
my $l = $_;
|
||||
chomp $l;
|
||||
if($l =~ /^([a-f0-9]+) (.*)/) {
|
||||
my ($sum, $file) = ($1, $2);
|
||||
$known{$file} = 1;
|
||||
}
|
||||
elsif($l =~ /^#/) {
|
||||
# skip comments
|
||||
}
|
||||
else {
|
||||
print STDERR "suspicious line in $sumsfile\n";
|
||||
$error++;
|
||||
}
|
||||
}
|
||||
close($mh);
|
||||
}
|
||||
|
||||
sub checkfile {
|
||||
my ($file) = @_;
|
||||
open(my $mh, "<", "$file") || die "can't read $file";
|
||||
my $line = 0;
|
||||
while(<$mh>) {
|
||||
my $l = $_;
|
||||
$line++;
|
||||
if($l =~ /([\x00-\x08\x0b\x0c\x0e-\x1f\x7f])/) {
|
||||
push @bin, $file;
|
||||
|
||||
if(!$known{$file}) {
|
||||
printf STDERR "$file:$line has unknown binary contents\n";
|
||||
$error++;
|
||||
}
|
||||
last;
|
||||
}
|
||||
}
|
||||
close($mh);
|
||||
}
|
||||
|
||||
my @files = `git ls-files -- $root`;
|
||||
|
||||
if(scalar(@files) < 3000) {
|
||||
# this means this is not the git source code repository or that git does
|
||||
# not work, error out!
|
||||
print STDERR "too few files in the git repository!\n";
|
||||
exit 1;
|
||||
}
|
||||
|
||||
knownbins();
|
||||
|
||||
if(scalar(keys %known) < 4) {
|
||||
print STDERR "too few known binaries in $sumsfile\n";
|
||||
exit 2;
|
||||
}
|
||||
|
||||
for my $f (@files) {
|
||||
chomp $f;
|
||||
checkfile("$root/$f");
|
||||
}
|
||||
|
||||
my $check=system("sha256sum -c $sumsfile");
|
||||
if($check) {
|
||||
print STDERR "sha256sum detected a problem\n";
|
||||
$error++;
|
||||
}
|
||||
|
||||
exit $error;
|
||||
7
.github/scripts/binarycheck.sums
vendored
7
.github/scripts/binarycheck.sums
vendored
@ -1,7 +0,0 @@
|
||||
# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
# SPDX-License-Identifier: curl
|
||||
c68161dba1c0166e4ab8d8ce00f57326db25d29fdd52c33d9974d0972ec60990 ./tests/certs/test-localhost-san-first.pub.der
|
||||
82430be03ec1783e2f9fad6e07a6f42cce62f8a23d87ea81a95977b47110c200 ./tests/certs/test-localhost-san-last.pub.der
|
||||
47233a0092db614f53e96a4df83ddeaa7e5242899ede1c1a90c53423a0b13bba ./tests/certs/test-localhost.nn.pub.der
|
||||
63898448aa199675a30fb6722046a665a7c1a5c24453e63d8c37397482a7dc52 ./tests/certs/test-localhost.pub.der
|
||||
f78c61bb06a71d1bf9b034ecfcb7fe35ae85b6a3b87bf3a73c085dc062747dc1 ./tests/certs/test-localhost0h.pub.der
|
||||
15
.github/scripts/spacecheck.pl
vendored
15
.github/scripts/spacecheck.pl
vendored
@ -28,16 +28,13 @@ use warnings;
|
||||
|
||||
my @tabs = (
|
||||
"^m4/zz40-xc-ovr.m4",
|
||||
"Makefile\\.[a-z]+\$",
|
||||
"Makefile\\.(am|example)\$",
|
||||
"/mkfile",
|
||||
"\\.(bat|sln|vc)\$",
|
||||
"^tests/certs/.+\\.der\$",
|
||||
"^tests/data/test",
|
||||
);
|
||||
|
||||
my @mixed_eol = (
|
||||
"^tests/certs/.+\\.(crt|der)\$",
|
||||
"^tests/certs/Server-localhost0h-sv.pem",
|
||||
"^tests/data/test",
|
||||
);
|
||||
|
||||
@ -47,14 +44,9 @@ my @need_crlf = (
|
||||
);
|
||||
|
||||
my @space_at_eol = (
|
||||
"^tests/.+\\.(cacert|crt|pem)\$",
|
||||
"^tests/data/test",
|
||||
);
|
||||
|
||||
my @eol_at_eof = (
|
||||
"^tests/certs/.+\\.der\$",
|
||||
);
|
||||
|
||||
sub fn_match {
|
||||
my ($filename, @masklist) = @_;
|
||||
|
||||
@ -129,7 +121,6 @@ while (my $filename = <$git_ls_files>) {
|
||||
}
|
||||
|
||||
if ($content ne "" &&
|
||||
!fn_match($filename, @eol_at_eof) &&
|
||||
$content !~ /\n\z/) {
|
||||
push @err, "content: has no EOL at EOF";
|
||||
}
|
||||
@ -139,6 +130,10 @@ while (my $filename = <$git_ls_files>) {
|
||||
push @err, "content: has multiple EOL at EOF";
|
||||
}
|
||||
|
||||
if($content =~ /([\x00-\x08\x0b\x0c\x0e-\x1f\x7f])/) {
|
||||
push @err, "content: has binary contents";
|
||||
}
|
||||
|
||||
if (@err) {
|
||||
$issues++;
|
||||
foreach my $err (@err) {
|
||||
|
||||
3
.github/workflows/checksrc.yml
vendored
3
.github/workflows/checksrc.yml
vendored
@ -110,9 +110,6 @@ jobs:
|
||||
- name: yamlcheck
|
||||
run: .github/scripts/yamlcheck.sh
|
||||
|
||||
- name: binarycheck
|
||||
run: .github/scripts/binarycheck.pl
|
||||
|
||||
# we allow some extra in source code
|
||||
- name: badwords
|
||||
run: |
|
||||
|
||||
2
.github/workflows/linux.yml
vendored
2
.github/workflows/linux.yml
vendored
@ -327,7 +327,7 @@ jobs:
|
||||
libssh2-dev zlib-dev brotli-dev zstd-dev libidn2-dev openldap-dev \
|
||||
heimdal-dev libpsl-dev c-ares-dev \
|
||||
py3-impacket py3-asn1 py3-six py3-pycryptodomex \
|
||||
perl-time-hires openssh stunnel sudo git
|
||||
perl-time-hires openssh stunnel sudo git openssl
|
||||
|
||||
- name: 'cache bearssl'
|
||||
if: contains(matrix.build.install_steps, 'bearssl')
|
||||
|
||||
11
.github/workflows/macos.yml
vendored
11
.github/workflows/macos.yml
vendored
@ -277,17 +277,6 @@ jobs:
|
||||
- name: 'test configs'
|
||||
run: grep -H -v '^#' bld/tests/config bld/tests/http/config.ini || true
|
||||
|
||||
- name: 'build-cert'
|
||||
if: contains(matrix.build.generate, '-DCURL_USE_SECTRANSP=ON') || contains(matrix.build.configure, '--with-secure-transport')
|
||||
run: |
|
||||
if [ -n '${{ matrix.build.generate }}' ]; then
|
||||
cmake --build bld --target clean-certs
|
||||
cmake --build bld --target build-certs --parallel 1
|
||||
else
|
||||
make -C bld/tests/certs clean-certs
|
||||
make -C bld/tests/certs build-certs -j1
|
||||
fi
|
||||
|
||||
- name: 'build'
|
||||
run: |
|
||||
if [ -n '${{ matrix.build.generate }}' ]; then
|
||||
|
||||
@ -5406,7 +5406,6 @@ AC_CONFIG_FILES([\
|
||||
tests/config \
|
||||
tests/configurehelp.pm \
|
||||
tests/certs/Makefile \
|
||||
tests/certs/scripts/Makefile \
|
||||
tests/data/Makefile \
|
||||
tests/server/Makefile \
|
||||
tests/libtest/Makefile \
|
||||
|
||||
@ -413,7 +413,7 @@ Run the local h3 server on port 9443, make it proxy all traffic through to
|
||||
HTTP/1 on localhost port 80. For local toying, we can just use the test cert
|
||||
that exists in curl's test dir.
|
||||
|
||||
% CERT=$CURLSRC/tests/stunnel.pem
|
||||
% CERT=/path/to/stunnel.pem
|
||||
% $HOME/bin/nghttpx $CERT $CERT --backend=localhost,80 \
|
||||
--frontend="localhost,9443;quic"
|
||||
|
||||
|
||||
@ -35,16 +35,16 @@ add_subdirectory(http/clients)
|
||||
add_subdirectory(server)
|
||||
add_subdirectory(libtest)
|
||||
add_subdirectory(unit)
|
||||
add_subdirectory(certs EXCLUDE_FROM_ALL)
|
||||
add_subdirectory(certs)
|
||||
|
||||
function(curl_add_runtests _targetname _test_flags)
|
||||
if(NOT BUILD_LIBCURL_DOCS)
|
||||
string(APPEND _test_flags " !documentation")
|
||||
endif()
|
||||
set(_depends "build-certs")
|
||||
# Skip walking through dependent targets before running tests in CI.
|
||||
# This avoids: GNU Make doing a slow re-evaluation of all targets and
|
||||
# skipping them, MSBuild doing a re-evaluation, and actually rebuilding them.
|
||||
set(_depends "")
|
||||
if(NOT _targetname STREQUAL "test-ci")
|
||||
set(_depends "testdeps")
|
||||
endif()
|
||||
|
||||
@ -157,28 +157,33 @@ SUFFIXES = .1 .md
|
||||
perlcheck:
|
||||
@if ! test -x "$(PERL)"; then echo "No perl!"; exit 2; fi
|
||||
|
||||
test: perlcheck all
|
||||
build-certs:
|
||||
(cd certs && $(MAKE) build-certs)
|
||||
|
||||
runtests-pre: perlcheck build-certs
|
||||
|
||||
test: runtests-pre all
|
||||
$(TEST) $(TFLAGS)
|
||||
|
||||
quiet-test: perlcheck all
|
||||
quiet-test: runtests-pre all
|
||||
$(TEST) $(TEST_Q) $(TFLAGS)
|
||||
|
||||
am-test: perlcheck all
|
||||
am-test: runtests-pre all
|
||||
$(TEST) $(TEST_AM) $(TFLAGS)
|
||||
|
||||
ci-test: perlcheck all
|
||||
ci-test: runtests-pre all
|
||||
$(TEST) $(TEST_CI) $(TFLAGS)
|
||||
|
||||
full-test: perlcheck all
|
||||
full-test: runtests-pre all
|
||||
$(TEST) $(TEST_F) $(TFLAGS)
|
||||
|
||||
nonflaky-test: perlcheck all
|
||||
nonflaky-test: runtests-pre all
|
||||
$(TEST) $(TEST_NF) $(TFLAGS)
|
||||
|
||||
torture-test: perlcheck all
|
||||
torture-test: runtests-pre all
|
||||
$(TEST) $(TEST_T) $(TFLAGS)
|
||||
|
||||
event-test: perlcheck all
|
||||
event-test: runtests-pre all
|
||||
$(TEST) $(TEST_E) $(TFLAGS)
|
||||
|
||||
default-pytest: ci-pytest
|
||||
|
||||
12
tests/certs/.gitignore
vendored
12
tests/certs/.gitignore
vendored
@ -1,4 +1,14 @@
|
||||
# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
#
|
||||
# SPDX-License-Identifier: curl
|
||||
gen
|
||||
test-*.crl
|
||||
test-*.crt
|
||||
test-*.csr
|
||||
test-*.der
|
||||
test-*.key*
|
||||
test-*.pem
|
||||
test-ca.cacert
|
||||
test-ca.cnt*
|
||||
test-ca.db*
|
||||
test-ca.raw*
|
||||
test-ca.srl
|
||||
|
||||
@ -21,26 +21,30 @@
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
# Get 'CERTCONFIG_CA', 'CERTCONFIGS', 'GENERATEDCERTS', 'SRPFILES' variables
|
||||
curl_transform_makefile_inc("Makefile.inc" "${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
|
||||
include("${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
|
||||
|
||||
find_program(SH_EXECUTABLE "sh")
|
||||
mark_as_advanced(SH_EXECUTABLE)
|
||||
if(SH_EXECUTABLE)
|
||||
# Get 'CERTCONFIGS', 'GENERATEDCERTS', 'SRPFILES' variables
|
||||
curl_transform_makefile_inc("Makefile.inc" "${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
|
||||
include("${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
|
||||
|
||||
add_custom_target(clean-certs
|
||||
COMMAND ${CMAKE_COMMAND} -E remove ${GENERATEDCERTS}
|
||||
WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR}
|
||||
string(REPLACE ";" " " _certconfigs "${CERTCONFIGS}")
|
||||
add_custom_command(OUTPUT ${GENERATEDCERTS}
|
||||
COMMAND ${SH_EXECUTABLE} -c "${CMAKE_CURRENT_SOURCE_DIR}/genserv.sh test ${_certconfigs}"
|
||||
DEPENDS "${CMAKE_CURRENT_SOURCE_DIR}/genserv.sh" ${CERTCONFIG_CA} ${CERTCONFIGS}
|
||||
VERBATIM
|
||||
)
|
||||
|
||||
add_custom_target(build-certs
|
||||
DEPENDS ${CERTCONFIGS} ${SRPFILES}
|
||||
COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genroot.sh" test
|
||||
COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost test
|
||||
COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost.nn test
|
||||
COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost0h test
|
||||
COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost-san-first test
|
||||
COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost-san-last test
|
||||
WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR}
|
||||
)
|
||||
DEPENDS ${GENERATEDCERTS})
|
||||
endif()
|
||||
|
||||
add_custom_target(clean-certs
|
||||
COMMAND ${CMAKE_COMMAND} -E remove ${GENERATEDCERTS}
|
||||
"test-*.csr"
|
||||
"test-*.der"
|
||||
"test-*.keyenc"
|
||||
"test-ca.cnt*"
|
||||
"test-ca.db*"
|
||||
"test-ca.raw*"
|
||||
"test-ca.srl"
|
||||
)
|
||||
|
||||
@ -23,35 +23,28 @@
|
||||
###########################################################################
|
||||
AUTOMAKE_OPTIONS = foreign
|
||||
|
||||
SUBDIRS = scripts
|
||||
|
||||
include Makefile.inc
|
||||
|
||||
EXTRA_DIST = $(CERTCONFIGS) $(GENERATEDCERTS) $(SRPFILES) CMakeLists.txt
|
||||
EXTRA_DIST = $(CERTCONFIG_CA) $(CERTCONFIGS) $(SRPFILES) CMakeLists.txt \
|
||||
genserv.sh
|
||||
|
||||
DISTCLEANFILES = $(GENERATEDCERTS)
|
||||
|
||||
# Rebuild the certificates
|
||||
|
||||
clean-certs:
|
||||
cd $(srcdir); rm -f $(GENERATEDCERTS)
|
||||
rm -f $(GENERATEDCERTS) \
|
||||
test-*.csr \
|
||||
test-*.der \
|
||||
test-*.keyenc \
|
||||
test-ca.cnt* \
|
||||
test-ca.db* \
|
||||
test-ca.raw* \
|
||||
test-ca.srl
|
||||
|
||||
build-certs: $(srcdir)/test-ca.cacert $(srcdir)/test-localhost.pem \
|
||||
$(srcdir)/test-localhost.nn.pem $(srcdir)/test-localhost0h.pem \
|
||||
$(srcdir)/test-localhost-san-first.pem $(srcdir)/test-localhost-san-last.pem
|
||||
build-certs: test-ca.cacert
|
||||
|
||||
$(srcdir)/test-ca.cacert:
|
||||
cd $(srcdir); scripts/genroot.sh test
|
||||
|
||||
$(srcdir)/test-localhost.pem: $(srcdir)/test-ca.cacert
|
||||
cd $(srcdir); scripts/genserv.sh test-localhost test
|
||||
|
||||
$(srcdir)/test-localhost.nn.pem: $(srcdir)/test-ca.cacert
|
||||
cd $(srcdir); scripts/genserv.sh test-localhost.nn test
|
||||
|
||||
$(srcdir)/test-localhost0h.pem: $(srcdir)/test-ca.cacert
|
||||
cd $(srcdir); scripts/genserv.sh test-localhost0h test
|
||||
|
||||
$(srcdir)/test-localhost-san-first.pem: $(srcdir)/test-ca.cacert
|
||||
cd $(srcdir); scripts/genserv.sh test-localhost-san-first test
|
||||
|
||||
$(srcdir)/test-localhost-san-last.pem: $(srcdir)/test-ca.cacert
|
||||
cd $(srcdir); scripts/genserv.sh test-localhost-san-last test
|
||||
# Generate all certs in a single shot, but declare just a single target file
|
||||
# to support GNU Make <4.3 without "grouped explicit targets" support.
|
||||
test-ca.cacert: $(CERTCONFIG_CA) $(CERTCONFIGS) genserv.sh
|
||||
$(srcdir)/genserv.sh test $(CERTCONFIGS)
|
||||
|
||||
@ -21,9 +21,11 @@
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
CERTCONFIGS = \
|
||||
test-ca.prm \
|
||||
CERTCONFIG_CA = \
|
||||
test-ca.cnf \
|
||||
test-ca.prm
|
||||
|
||||
CERTCONFIGS = \
|
||||
test-localhost.prm \
|
||||
test-localhost.nn.prm \
|
||||
test-localhost0h.prm \
|
||||
|
||||
101
tests/certs/genserv.sh
Executable file
101
tests/certs/genserv.sh
Executable file
@ -0,0 +1,101 @@
|
||||
#!/bin/sh
|
||||
#***************************************************************************
|
||||
# _ _ ____ _
|
||||
# Project ___| | | | _ \| |
|
||||
# / __| | | | |_) | |
|
||||
# | (__| |_| | _ <| |___
|
||||
# \___|\___/|_| \_\_____|
|
||||
#
|
||||
# Copyright (C) EdelWeb for EdelKey and OpenEvidence
|
||||
#
|
||||
# This software is licensed as described in the file COPYING, which
|
||||
# you should have received as part of this distribution. The terms
|
||||
# are also available at https://curl.se/docs/copyright.html.
|
||||
#
|
||||
# You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||||
# copies of the Software, and permit persons to whom the Software is
|
||||
# furnished to do so, under the terms of the COPYING file.
|
||||
#
|
||||
# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||||
# KIND, either express or implied.
|
||||
#
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
|
||||
# exit on first fail
|
||||
set -eu
|
||||
|
||||
OPENSSL=openssl
|
||||
if [ -f /usr/local/ssl/bin/openssl ]; then
|
||||
OPENSSL=/usr/local/ssl/bin/openssl
|
||||
fi
|
||||
|
||||
USAGE='echo Usage is genserv.sh <caprefix> [<prefix> ...]'
|
||||
|
||||
SRCDIR="$(dirname "${0}")"
|
||||
|
||||
KEYSIZE=prime256v1
|
||||
|
||||
CAPREFIX="${1:-}"
|
||||
shift
|
||||
if [ -z "$CAPREFIX" ]; then
|
||||
echo 'No CA prefix'
|
||||
$USAGE
|
||||
exit
|
||||
elif [ ! -f "$CAPREFIX-ca.cacert" ] || \
|
||||
[ ! -f "$CAPREFIX-ca.key" ]; then
|
||||
|
||||
command -v "$OPENSSL"
|
||||
"$OPENSSL" version
|
||||
|
||||
# Generating CA root
|
||||
PREFIX=$CAPREFIX
|
||||
DURATION=6000
|
||||
|
||||
"$OPENSSL" genpkey -algorithm EC -pkeyopt ec_paramgen_curve:"$KEYSIZE" -pkeyopt ec_param_enc:named_curve \
|
||||
-out "$PREFIX-ca.key" -pass 'pass:secret'
|
||||
"$OPENSSL" req -config "$SRCDIR/$PREFIX-ca.prm" -new -key "$PREFIX-ca.key" -out "$PREFIX-ca.csr" -passin 'pass:secret' 2>/dev/null
|
||||
"$OPENSSL" x509 -sha256 -extfile "$SRCDIR/$PREFIX-ca.prm" -days "$DURATION" \
|
||||
-req -signkey "$PREFIX-ca.key" -in "$PREFIX-ca.csr" -out "$PREFIX-ca.raw-cacert"
|
||||
"$OPENSSL" x509 -in "$PREFIX-ca.raw-cacert" -text -nameopt multiline > "$PREFIX-ca.cacert"
|
||||
"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -outform der -out "$PREFIX-ca.der"
|
||||
"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -text -nameopt multiline > "$PREFIX-ca.crt"
|
||||
|
||||
echo "CA root generated: $PREFIX ${DURATION}days $KEYSIZE"
|
||||
fi
|
||||
|
||||
DURATION=300
|
||||
|
||||
while [ -n "${1:-}" ]; do
|
||||
|
||||
PREFIX="${1%.prm}"
|
||||
shift
|
||||
|
||||
# pseudo-secrets
|
||||
"$OPENSSL" genpkey -algorithm EC -pkeyopt ec_paramgen_curve:"$KEYSIZE" -pkeyopt ec_param_enc:named_curve \
|
||||
-out "$PREFIX.keyenc" -pass 'pass:secret'
|
||||
"$OPENSSL" req -config "$SRCDIR/$PREFIX.prm" -new -key "$PREFIX.keyenc" -out "$PREFIX.csr" -passin 'pass:secret' 2>/dev/null
|
||||
"$OPENSSL" pkey -in "$PREFIX.keyenc" -out "$PREFIX.key" -passin 'pass:secret'
|
||||
|
||||
"$OPENSSL" pkey -in "$PREFIX.key" -pubout -outform DER -out "$PREFIX.pub.der"
|
||||
"$OPENSSL" pkey -in "$PREFIX.key" -pubout -outform PEM -out "$PREFIX.pub.pem"
|
||||
"$OPENSSL" x509 -sha256 -extfile "$SRCDIR/$PREFIX.prm" -days "$DURATION" \
|
||||
-req -CA "$CAPREFIX-ca.cacert" -CAkey "$CAPREFIX-ca.key" -CAcreateserial -in "$PREFIX.csr" > "$PREFIX.crt" 2>/dev/null
|
||||
|
||||
# revoke server cert
|
||||
touch "$CAPREFIX-ca.db"
|
||||
echo 01 > "$CAPREFIX-ca.cnt"
|
||||
"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -revoke "$PREFIX.crt" 2>/dev/null
|
||||
|
||||
# issue CRL
|
||||
"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -gencrl -out "$PREFIX.crl" 2>/dev/null
|
||||
|
||||
"$OPENSSL" x509 -in "$PREFIX.crt" -outform der -out "$PREFIX.der"
|
||||
|
||||
# all together now
|
||||
cat "$SRCDIR/$PREFIX.prm" "$PREFIX.key" "$PREFIX.crt" > "$PREFIX.pem"
|
||||
chmod o-r "$SRCDIR/$PREFIX.prm"
|
||||
|
||||
echo "Certificate generated: CA=$CAPREFIX ${DURATION}days $KEYSIZE $PREFIX"
|
||||
done
|
||||
@ -1,30 +0,0 @@
|
||||
#***************************************************************************
|
||||
# _ _ ____ _
|
||||
# Project ___| | | | _ \| |
|
||||
# / __| | | | |_) | |
|
||||
# | (__| |_| | _ <| |___
|
||||
# \___|\___/|_| \_\_____|
|
||||
#
|
||||
# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
#
|
||||
# This software is licensed as described in the file COPYING, which
|
||||
# you should have received as part of this distribution. The terms
|
||||
# are also available at https://curl.se/docs/copyright.html.
|
||||
#
|
||||
# You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||||
# copies of the Software, and permit persons to whom the Software is
|
||||
# furnished to do so, under the terms of the COPYING file.
|
||||
#
|
||||
# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||||
# KIND, either express or implied.
|
||||
#
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
AUTOMAKE_OPTIONS = foreign
|
||||
|
||||
SCRIPTFILES = \
|
||||
genroot.sh \
|
||||
genserv.sh
|
||||
|
||||
EXTRA_DIST = $(SCRIPTFILES)
|
||||
@ -1,87 +0,0 @@
|
||||
#!/usr/bin/env bash
|
||||
#***************************************************************************
|
||||
# _ _ ____ _
|
||||
# Project ___| | | | _ \| |
|
||||
# / __| | | | |_) | |
|
||||
# | (__| |_| | _ <| |___
|
||||
# \___|\___/|_| \_\_____|
|
||||
#
|
||||
# Copyright (C) EdelWeb for EdelKey and OpenEvidence
|
||||
#
|
||||
# This software is licensed as described in the file COPYING, which
|
||||
# you should have received as part of this distribution. The terms
|
||||
# are also available at https://curl.se/docs/copyright.html.
|
||||
#
|
||||
# You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||||
# copies of the Software, and permit persons to whom the Software is
|
||||
# furnished to do so, under the terms of the COPYING file.
|
||||
#
|
||||
# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||||
# KIND, either express or implied.
|
||||
#
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
|
||||
# exit on first fail
|
||||
set -eu
|
||||
|
||||
OPENSSL=openssl
|
||||
if [ -f /usr/local/ssl/bin/openssl ]; then
|
||||
OPENSSL=/usr/local/ssl/bin/openssl
|
||||
fi
|
||||
|
||||
command -v "$OPENSSL"
|
||||
"$OPENSSL" version
|
||||
|
||||
USAGE='echo Usage is genroot.sh <name>'
|
||||
|
||||
SRCDIR=$(pwd)
|
||||
|
||||
GENDIR=${GENDIR:-$SRCDIR/gen}
|
||||
test -d "$GENDIR" || mkdir "$GENDIR"
|
||||
cd "$GENDIR"
|
||||
|
||||
KEYSIZE=2048
|
||||
DURATION=6000
|
||||
# The -sha256 option was introduced in OpenSSL 1.0.1
|
||||
DIGESTALGO=-sha256
|
||||
|
||||
NOTOK=
|
||||
|
||||
PREFIX="${1:-}"
|
||||
if [ -z "$PREFIX" ]; then
|
||||
echo 'No configuration prefix'
|
||||
NOTOK=1
|
||||
else
|
||||
if [ ! -f "$SRCDIR/$PREFIX-ca.prm" ]; then
|
||||
echo "No configuration file $SRCDIR/$PREFIX-ca.prm"
|
||||
NOTOK=1
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ -n "$NOTOK" ]; then
|
||||
echo 'Sorry, I cannot do that for you.'
|
||||
$USAGE
|
||||
exit
|
||||
fi
|
||||
|
||||
echo "PREFIX=$PREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE"
|
||||
|
||||
set -x
|
||||
|
||||
"$OPENSSL" genrsa -out "$PREFIX-ca.key" -passout fd:0 "$KEYSIZE" <<EOF
|
||||
pass:secret
|
||||
EOF
|
||||
"$OPENSSL" req -config "$SRCDIR/$PREFIX-ca.prm" -new -key "$PREFIX-ca.key" -out "$PREFIX-ca.csr" -passin fd:0 <<EOF
|
||||
pass:secret
|
||||
EOF
|
||||
"$OPENSSL" x509 -extfile "$SRCDIR/$PREFIX-ca.prm" -days "$DURATION" -req -signkey "$PREFIX-ca.key" -in "$PREFIX-ca.csr" -out "$PREFIX-ca.raw-cacert" "$DIGESTALGO"
|
||||
"$OPENSSL" x509 -text -in "$PREFIX-ca.raw-cacert" -nameopt multiline > "$PREFIX-ca.cacert"
|
||||
"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -outform der -out "$PREFIX-ca.der"
|
||||
"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -text -nameopt multiline > "$PREFIX-ca.crt"
|
||||
|
||||
for ext in key cacert crt; do
|
||||
cp "$PREFIX-ca.$ext" "$SRCDIR"/
|
||||
done
|
||||
echo "ca root $PREFIX generated."
|
||||
@ -1,131 +0,0 @@
|
||||
#!/usr/bin/env bash
|
||||
#***************************************************************************
|
||||
# _ _ ____ _
|
||||
# Project ___| | | | _ \| |
|
||||
# / __| | | | |_) | |
|
||||
# | (__| |_| | _ <| |___
|
||||
# \___|\___/|_| \_\_____|
|
||||
#
|
||||
# Copyright (C) EdelWeb for EdelKey and OpenEvidence
|
||||
#
|
||||
# This software is licensed as described in the file COPYING, which
|
||||
# you should have received as part of this distribution. The terms
|
||||
# are also available at https://curl.se/docs/copyright.html.
|
||||
#
|
||||
# You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||||
# copies of the Software, and permit persons to whom the Software is
|
||||
# furnished to do so, under the terms of the COPYING file.
|
||||
#
|
||||
# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||||
# KIND, either express or implied.
|
||||
#
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
|
||||
# exit on first fail
|
||||
set -eu
|
||||
|
||||
OPENSSL=openssl
|
||||
if [ -f /usr/local/ssl/bin/openssl ]; then
|
||||
OPENSSL=/usr/local/ssl/bin/openssl
|
||||
fi
|
||||
|
||||
command -v "$OPENSSL"
|
||||
"$OPENSSL" version
|
||||
|
||||
USAGE='echo Usage is genserv.sh <prefix> <caprefix>'
|
||||
|
||||
SRCDIR=$(pwd)
|
||||
|
||||
GENDIR=${GENDIR:-$SRCDIR/gen}
|
||||
test -d "$GENDIR" || mkdir "$GENDIR"
|
||||
cd "$GENDIR"
|
||||
|
||||
KEYSIZE=2048
|
||||
DURATION=300
|
||||
# The -sha256 option was introduced in OpenSSL 1.0.1
|
||||
DIGESTALGO=-sha256
|
||||
|
||||
REQ=YES
|
||||
P12=NO
|
||||
|
||||
NOTOK=
|
||||
|
||||
PREFIX="${1:-}"
|
||||
if [ -z "$PREFIX" ]; then
|
||||
echo 'No configuration prefix'
|
||||
NOTOK=1
|
||||
else
|
||||
if [ ! -f "$SRCDIR/$PREFIX.prm" ]; then
|
||||
echo "No configuration file $SRCDIR/$PREFIX.prm"
|
||||
NOTOK=1
|
||||
fi
|
||||
fi
|
||||
|
||||
CAPREFIX="${2:-}"
|
||||
if [ -z "$CAPREFIX" ]; then
|
||||
echo 'No CA prefix'
|
||||
NOTOK=1
|
||||
else
|
||||
if [ ! -f "$CAPREFIX-ca.cacert" ]; then
|
||||
echo "No CA certificate file $CAPREFIX-ca.cacert"
|
||||
NOTOK=1
|
||||
fi
|
||||
if [ ! -f "$CAPREFIX-ca.key" ]; then
|
||||
echo "No $CAPREFIX key"
|
||||
NOTOK=1
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ -n "$NOTOK" ]; then
|
||||
echo 'Sorry, I cannot do that for you.'
|
||||
$USAGE
|
||||
exit
|
||||
fi
|
||||
|
||||
echo "PREFIX=$PREFIX CAPREFIX=$CAPREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE"
|
||||
|
||||
set -x
|
||||
|
||||
if [ "$REQ" = YES ]; then
|
||||
"$OPENSSL" req -config "$SRCDIR/$PREFIX.prm" -newkey "rsa:$KEYSIZE" -keyout "$PREFIX.key" -out "$PREFIX.csr" -passout fd:0 <<EOF
|
||||
pass:secret
|
||||
EOF
|
||||
fi
|
||||
|
||||
"$OPENSSL" rsa -in "$PREFIX.key" -out "$PREFIX.key" -passin fd:0 <<EOF
|
||||
pass:secret
|
||||
EOF
|
||||
|
||||
echo 'pseudo secrets generated'
|
||||
|
||||
"$OPENSSL" rsa -in "$PREFIX.key" -pubout -outform DER -out "$PREFIX.pub.der"
|
||||
"$OPENSSL" rsa -in "$PREFIX.key" -pubout -outform PEM -out "$PREFIX.pub.pem"
|
||||
"$OPENSSL" x509 -extfile "$SRCDIR/$PREFIX.prm" -days "$DURATION" -CA "$CAPREFIX-ca.cacert" -CAkey "$CAPREFIX-ca.key" -CAcreateserial -in "$PREFIX.csr" -req -text -nameopt multiline "$DIGESTALGO" > "$PREFIX.crt"
|
||||
|
||||
if [ "$P12" = YES ]; then
|
||||
"$OPENSSL" pkcs12 -export -des3 -out "$PREFIX.p12" -caname "$CAPREFIX" -name "$PREFIX" -inkey "$PREFIX.key" -in "$PREFIX.crt" -certfile "$CAPREFIX-ca.crt"
|
||||
fi
|
||||
|
||||
"$OPENSSL" x509 -noout -text -hash -in "$PREFIX.crt" -nameopt multiline
|
||||
|
||||
# revoke server cert
|
||||
touch "$CAPREFIX-ca.db"
|
||||
echo 01 > "$CAPREFIX-ca.cnt"
|
||||
"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -revoke "$PREFIX.crt"
|
||||
|
||||
# issue CRL
|
||||
"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -gencrl -out "$PREFIX.crl"
|
||||
|
||||
"$OPENSSL" x509 -in "$PREFIX.crt" -outform der -out "$PREFIX.der"
|
||||
|
||||
# all together now
|
||||
cat "$SRCDIR/$PREFIX.prm" "$PREFIX.key" "$PREFIX.crt" > "$PREFIX.pem"
|
||||
chmod o-r "$SRCDIR/$PREFIX.prm"
|
||||
|
||||
#for ext in crl crt csr der key pem pub.der pub.pem; do
|
||||
for ext in crl crt key pem pub.der pub.pem; do
|
||||
cp "$PREFIX.$ext" "$SRCDIR"/
|
||||
done
|
||||
echo "certificates for $PREFIX generated."
|
||||
@ -1,99 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
ed:c7:ef:5d:c1:2b:f1:2f
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:47 2025 GMT
|
||||
Not After : Aug 9 11:51:47 2041 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:cb:e8:c2:61:24:08:95:87:5d:dd:80:67:29:9a:
|
||||
0a:b0:55:28:1c:86:75:22:ec:8a:a3:ad:e8:3c:88:
|
||||
2c:bb:a2:5c:48:0a:9b:36:c3:b3:6b:1d:ef:1c:79:
|
||||
80:05:cb:81:45:93:4d:96:f8:a7:0c:93:84:71:1e:
|
||||
5a:27:83:16:84:be:0a:fc:08:eb:f6:60:7f:3e:8e:
|
||||
6d:39:8b:55:7a:c0:a2:7b:8c:a6:45:27:9e:6e:37:
|
||||
ad:b5:40:8a:83:7c:d2:0d:b0:e2:3d:ed:f5:3d:26:
|
||||
de:b7:7c:99:3c:56:98:bc:9d:49:bf:c8:ce:12:b5:
|
||||
40:1e:f7:4e:91:78:80:52:7a:83:84:9e:ec:0d:0e:
|
||||
18:40:cb:ec:95:76:85:ff:88:9a:8f:12:a4:ef:7e:
|
||||
7f:30:66:3a:cb:0e:b4:6a:d7:5c:8c:b3:e1:4c:57:
|
||||
47:45:ec:59:27:80:5b:11:37:1a:cd:41:d0:30:06:
|
||||
b7:fa:45:0f:37:8b:39:24:c3:3d:55:ba:a9:ef:68:
|
||||
88:3e:c4:4c:a7:43:44:13:27:06:95:ba:89:74:59:
|
||||
f8:a6:d0:8f:39:a2:d7:74:dd:9b:95:95:4b:8f:d7:
|
||||
70:dc:7b:68:cf:ee:9b:89:72:41:1b:2a:d2:b1:a3:
|
||||
a4:eb:6a:94:c2:e4:d0:ab:93:83:37:d1:12:28:b3:
|
||||
19:6b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
12:fd:0c:0f:2b:d8:e0:45:e3:b3:f4:43:de:e9:bc:5c:ce:6d:
|
||||
56:db:2a:30:cd:d3:46:5d:c1:6b:00:fb:fc:9c:d8:0b:7d:18:
|
||||
f8:ef:9a:84:3e:44:94:0e:ae:f8:5f:69:ed:1a:ac:0b:c1:af:
|
||||
7e:63:83:2c:cb:73:81:ce:f3:88:1c:8b:59:38:42:15:ba:64:
|
||||
08:ff:55:a9:d9:59:1b:3a:c5:90:b2:fe:19:a6:22:73:f5:a8:
|
||||
c2:58:45:5a:c8:13:2f:cd:39:7f:67:86:17:26:9e:56:19:e6:
|
||||
b9:72:39:a4:21:a9:99:9c:8d:71:15:33:c7:25:90:b5:df:65:
|
||||
9d:35:22:13:a4:b2:e1:56:00:fd:5b:ca:65:58:0d:46:13:fe:
|
||||
d7:ba:c4:3a:56:24:79:cf:e8:fa:26:25:b9:f7:48:31:e8:c3:
|
||||
fd:30:d7:a9:d3:a3:cf:6c:ca:03:d5:b4:54:cd:05:a6:67:a4:
|
||||
ca:fb:25:29:0e:00:e8:cc:37:86:91:4b:e4:8a:f4:eb:15:4c:
|
||||
d6:d6:f5:87:61:00:eb:dd:a9:d8:09:56:ca:e4:1c:1c:79:04:
|
||||
6e:fd:9d:00:54:6a:e1:78:14:c0:a2:ca:c1:07:39:82:57:9e:
|
||||
63:d9:b8:d4:20:96:25:da:59:fe:da:3a:d4:fe:e4:74:f1:19:
|
||||
56:63:01:46
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIENzCCAx+gAwIBAgIJAO3H713BK/EvMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDdaFw00MTA4MDkxMTUxNDdaMGgxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hvcjCCASIw
|
||||
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvowmEkCJWHXd2AZymaCrBVKByG
|
||||
dSLsiqOt6DyILLuiXEgKmzbDs2sd7xx5gAXLgUWTTZb4pwyThHEeWieDFoS+CvwI
|
||||
6/Zgfz6ObTmLVXrAonuMpkUnnm43rbVAioN80g2w4j3t9T0m3rd8mTxWmLydSb/I
|
||||
zhK1QB73TpF4gFJ6g4Se7A0OGEDL7JV2hf+Imo8SpO9+fzBmOssOtGrXXIyz4UxX
|
||||
R0XsWSeAWxE3Gs1B0DAGt/pFDzeLOSTDPVW6qe9oiD7ETKdDRBMnBpW6iXRZ+KbQ
|
||||
jzmi13Tdm5WVS4/XcNx7aM/um4lyQRsq0rGjpOtqlMLk0KuTgzfREiizGWsCAwEA
|
||||
AaOB4zCB4DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E
|
||||
FgQUnSvOlb/YIpGi5a3+eQ7pI+FNKDIwHwYDVR0jBBgwFoAUnSvOlb/YIpGi5a3+
|
||||
eQ7pI+FNKDIwQwYIKwYBBQUHAQEENzA1MDMGCCsGAQUFBzAChidodHRwOi8vdGVz
|
||||
dC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIwOAYDVR0fBDEwLzAtoCugKYYn
|
||||
aHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY3JsMA0GCSqGSIb3
|
||||
DQEBCwUAA4IBAQAS/QwPK9jgReOz9EPe6bxczm1W2yowzdNGXcFrAPv8nNgLfRj4
|
||||
75qEPkSUDq74X2ntGqwLwa9+Y4Msy3OBzvOIHItZOEIVumQI/1Wp2VkbOsWQsv4Z
|
||||
piJz9ajCWEVayBMvzTl/Z4YXJp5WGea5cjmkIamZnI1xFTPHJZC132WdNSITpLLh
|
||||
VgD9W8plWA1GE/7XusQ6ViR5z+j6JiW590gx6MP9MNep06PPbMoD1bRUzQWmZ6TK
|
||||
+yUpDgDozDeGkUvkivTrFUzW1vWHYQDr3anYCVbK5BwceQRu/Z0AVGrheBTAosrB
|
||||
BzmCV55j2bjUIJYl2ln+2jrU/uR08RlWYwFG
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,99 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
ed:c7:ef:5d:c1:2b:f1:2f
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:47 2025 GMT
|
||||
Not After : Aug 9 11:51:47 2041 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:cb:e8:c2:61:24:08:95:87:5d:dd:80:67:29:9a:
|
||||
0a:b0:55:28:1c:86:75:22:ec:8a:a3:ad:e8:3c:88:
|
||||
2c:bb:a2:5c:48:0a:9b:36:c3:b3:6b:1d:ef:1c:79:
|
||||
80:05:cb:81:45:93:4d:96:f8:a7:0c:93:84:71:1e:
|
||||
5a:27:83:16:84:be:0a:fc:08:eb:f6:60:7f:3e:8e:
|
||||
6d:39:8b:55:7a:c0:a2:7b:8c:a6:45:27:9e:6e:37:
|
||||
ad:b5:40:8a:83:7c:d2:0d:b0:e2:3d:ed:f5:3d:26:
|
||||
de:b7:7c:99:3c:56:98:bc:9d:49:bf:c8:ce:12:b5:
|
||||
40:1e:f7:4e:91:78:80:52:7a:83:84:9e:ec:0d:0e:
|
||||
18:40:cb:ec:95:76:85:ff:88:9a:8f:12:a4:ef:7e:
|
||||
7f:30:66:3a:cb:0e:b4:6a:d7:5c:8c:b3:e1:4c:57:
|
||||
47:45:ec:59:27:80:5b:11:37:1a:cd:41:d0:30:06:
|
||||
b7:fa:45:0f:37:8b:39:24:c3:3d:55:ba:a9:ef:68:
|
||||
88:3e:c4:4c:a7:43:44:13:27:06:95:ba:89:74:59:
|
||||
f8:a6:d0:8f:39:a2:d7:74:dd:9b:95:95:4b:8f:d7:
|
||||
70:dc:7b:68:cf:ee:9b:89:72:41:1b:2a:d2:b1:a3:
|
||||
a4:eb:6a:94:c2:e4:d0:ab:93:83:37:d1:12:28:b3:
|
||||
19:6b
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE
|
||||
X509v3 Key Usage: critical
|
||||
Certificate Sign, CRL Sign
|
||||
X509v3 Subject Key Identifier:
|
||||
9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
12:fd:0c:0f:2b:d8:e0:45:e3:b3:f4:43:de:e9:bc:5c:ce:6d:
|
||||
56:db:2a:30:cd:d3:46:5d:c1:6b:00:fb:fc:9c:d8:0b:7d:18:
|
||||
f8:ef:9a:84:3e:44:94:0e:ae:f8:5f:69:ed:1a:ac:0b:c1:af:
|
||||
7e:63:83:2c:cb:73:81:ce:f3:88:1c:8b:59:38:42:15:ba:64:
|
||||
08:ff:55:a9:d9:59:1b:3a:c5:90:b2:fe:19:a6:22:73:f5:a8:
|
||||
c2:58:45:5a:c8:13:2f:cd:39:7f:67:86:17:26:9e:56:19:e6:
|
||||
b9:72:39:a4:21:a9:99:9c:8d:71:15:33:c7:25:90:b5:df:65:
|
||||
9d:35:22:13:a4:b2:e1:56:00:fd:5b:ca:65:58:0d:46:13:fe:
|
||||
d7:ba:c4:3a:56:24:79:cf:e8:fa:26:25:b9:f7:48:31:e8:c3:
|
||||
fd:30:d7:a9:d3:a3:cf:6c:ca:03:d5:b4:54:cd:05:a6:67:a4:
|
||||
ca:fb:25:29:0e:00:e8:cc:37:86:91:4b:e4:8a:f4:eb:15:4c:
|
||||
d6:d6:f5:87:61:00:eb:dd:a9:d8:09:56:ca:e4:1c:1c:79:04:
|
||||
6e:fd:9d:00:54:6a:e1:78:14:c0:a2:ca:c1:07:39:82:57:9e:
|
||||
63:d9:b8:d4:20:96:25:da:59:fe:da:3a:d4:fe:e4:74:f1:19:
|
||||
56:63:01:46
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIENzCCAx+gAwIBAgIJAO3H713BK/EvMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDdaFw00MTA4MDkxMTUxNDdaMGgxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hvcjCCASIw
|
||||
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvowmEkCJWHXd2AZymaCrBVKByG
|
||||
dSLsiqOt6DyILLuiXEgKmzbDs2sd7xx5gAXLgUWTTZb4pwyThHEeWieDFoS+CvwI
|
||||
6/Zgfz6ObTmLVXrAonuMpkUnnm43rbVAioN80g2w4j3t9T0m3rd8mTxWmLydSb/I
|
||||
zhK1QB73TpF4gFJ6g4Se7A0OGEDL7JV2hf+Imo8SpO9+fzBmOssOtGrXXIyz4UxX
|
||||
R0XsWSeAWxE3Gs1B0DAGt/pFDzeLOSTDPVW6qe9oiD7ETKdDRBMnBpW6iXRZ+KbQ
|
||||
jzmi13Tdm5WVS4/XcNx7aM/um4lyQRsq0rGjpOtqlMLk0KuTgzfREiizGWsCAwEA
|
||||
AaOB4zCB4DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E
|
||||
FgQUnSvOlb/YIpGi5a3+eQ7pI+FNKDIwHwYDVR0jBBgwFoAUnSvOlb/YIpGi5a3+
|
||||
eQ7pI+FNKDIwQwYIKwYBBQUHAQEENzA1MDMGCCsGAQUFBzAChidodHRwOi8vdGVz
|
||||
dC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIwOAYDVR0fBDEwLzAtoCugKYYn
|
||||
aHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY3JsMA0GCSqGSIb3
|
||||
DQEBCwUAA4IBAQAS/QwPK9jgReOz9EPe6bxczm1W2yowzdNGXcFrAPv8nNgLfRj4
|
||||
75qEPkSUDq74X2ntGqwLwa9+Y4Msy3OBzvOIHItZOEIVumQI/1Wp2VkbOsWQsv4Z
|
||||
piJz9ajCWEVayBMvzTl/Z4YXJp5WGea5cjmkIamZnI1xFTPHJZC132WdNSITpLLh
|
||||
VgD9W8plWA1GE/7XusQ6ViR5z+j6JiW590gx6MP9MNep06PPbMoD1bRUzQWmZ6TK
|
||||
+yUpDgDozDeGkUvkivTrFUzW1vWHYQDr3anYCVbK5BwceQRu/Z0AVGrheBTAosrB
|
||||
BzmCV55j2bjUIJYl2ln+2jrU/uR08RlWYwFG
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,27 +0,0 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEowIBAAKCAQEAy+jCYSQIlYdd3YBnKZoKsFUoHIZ1IuyKo63oPIgsu6JcSAqb
|
||||
NsOzax3vHHmABcuBRZNNlvinDJOEcR5aJ4MWhL4K/Ajr9mB/Po5tOYtVesCie4ym
|
||||
RSeebjettUCKg3zSDbDiPe31PSbet3yZPFaYvJ1Jv8jOErVAHvdOkXiAUnqDhJ7s
|
||||
DQ4YQMvslXaF/4iajxKk735/MGY6yw60atdcjLPhTFdHRexZJ4BbETcazUHQMAa3
|
||||
+kUPN4s5JMM9Vbqp72iIPsRMp0NEEycGlbqJdFn4ptCPOaLXdN2blZVLj9dw3Hto
|
||||
z+6biXJBGyrSsaOk62qUwuTQq5ODN9ESKLMZawIDAQABAoIBACGH+BbzTvoP1Y6s
|
||||
I8rCiwluJ3dxYOfKUA4UdgEmP3zneRdbryR1UBbISF69WCEb0vk2/OZbo1S9GWVk
|
||||
oVyoANb5TWMesHbGbYZC85En6XmTHeUFPv5WQoZLX6RTpbNznjMkKEAY1mAk+TDh
|
||||
K22xq9IwZ0VDZyfKaG3vKxte3nMxaMyT3Gaa8KZGrHI8OgDhd9ty9pzwKkQJslFm
|
||||
gObVtGpVNWnKLaHBRre4KcAj8dFxo+alu3a+rIzfUf1fFBLC5LB+m0n2xjoWyyxU
|
||||
ahKY2YNv8dgOMlxK62TXJT0VtSZSeBOSU+Wyz+KCZHJKS0pMM/QyijwLTPxgpAtk
|
||||
DGwqE8ECgYEA/YNVqFGw8xPTx5pkYl+3Wb84MwdyKc4/fgyOO2tCl6wgvt1EGWvd
|
||||
fr3v9m+K2zLwxhIQ1WalUE+zghgT4no4NDc1u3XNoduwyua8RAnu+g0UkyP+U4+Q
|
||||
ZoIBgdytTL7NkIRIipPY9hGAC+qK2cu1NvURbIRkUx0R1Y89ASnyu2ECgYEAzejZ
|
||||
4ZeCsdfr2KkOGGLOH7NODjxbgHHy5Z97pLK+zuaR25k/nQYBccxupp0eiAU5RuvS
|
||||
6oXkCEUIpvOTOCHrCg5M+3jvD67UOA9gFa+SKswSyw+EVTZbtPaBT0hiKHsax6mw
|
||||
qOHHE7pzmTP6/CNxedqLRLxEpxY5Q+dVw2iWtEsCgYAg3lNPxG+txGdT3MehHYnX
|
||||
H/y4WQHLO8ttm1EhkRGMOqvwMx3uMdcA5L1k9SdKrjsbYyI9mNZcKEk818RUO8Zn
|
||||
trTHvklP7/znAa1tIOCUGPgO7768tMNjFv39CVCKv75FO3FwTiT2GmTApsMj4851
|
||||
9qYwrKWZRQ6X4r9lFDw9YQKBgCoEMrmKzht2IOUUEhE90Cu9zdav0EgUeGkMsxE3
|
||||
fCICAI9b5RQojpDnE0kiVIGS904WfvJmIdLiK1LN7yOMIEbsBh9mXPnJRfqugH/M
|
||||
VLow7EDNSMaOkgYKKva/oW/7Nsq5QJglghbve/kuFy/uF5Cy3KpI9IVXzpWhlemK
|
||||
5P2jAoGBAKEspNFmBoktf0xcFjjL60aZVIFsUptajwc/Zolp89B8RznqOa4PY4Yy
|
||||
VOmCYJKOlc8z9H3guhE15mT3h4rVfITJQZtN+fbvSo6ZIWrJpTOXIxL817k9ABLC
|
||||
F6axj6OPoQnvKSCGMG8HZUSAmsP9zuXB9q+rv9S6Vx7/pbKJAPwo
|
||||
-----END RSA PRIVATE KEY-----
|
||||
@ -1,38 +0,0 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIGljCCBX4CAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
|
||||
BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
|
||||
BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
|
||||
NDhaFw0yNTA0MDUxMTUxNDhaMIIE0DAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
|
||||
NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
|
||||
MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
|
||||
8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
|
||||
AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
|
||||
MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
|
||||
DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
|
||||
NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
|
||||
OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
|
||||
MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
|
||||
8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
|
||||
AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
|
||||
MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
|
||||
DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
|
||||
NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
|
||||
OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
|
||||
MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
|
||||
8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
|
||||
AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
|
||||
MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
|
||||
DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
|
||||
NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
|
||||
NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
|
||||
MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
|
||||
8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa
|
||||
AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFowGgIJAIE0yC2B8FQiFw0yNTAzMDYx
|
||||
MTUxNDhaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG9w0BAQsFAAOCAQEAOdQrSZ52
|
||||
zX1CEvfAPHLbvjj7XFeF3OLNPd64+B81dqh9WuLix5xbKQjhpMNj0Qyypc3COvka
|
||||
Uzz+H13LzJL4lC4Wt8lawZu0zLeUJ/4oEXxq1wAlwQ/V2ZcE8scVd2t3YRs3IWLi
|
||||
u1Gpoq7RSiFv2Zh+EaF3o7VcEdhdKvckQ+lxrZgcEYt5HRz2+/yY8RAhPN1JDw++
|
||||
+M1PBgJPj11pKpz01mJ0hYH2lDFC3sTb4dxVGCUDTtg/Be21NF48+OoCBG++JPk1
|
||||
EZB/3U5+4UECgQCdBTO14xAt3S21dt2EMIN67bGi943rskxrvrS0V2WXAfMZi15g
|
||||
jvjUTbJ/o2Q71w==
|
||||
-----END X509 CRL-----
|
||||
@ -1,104 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:22
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:48 2025 GMT
|
||||
Not After : Dec 31 11:51:48 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost.nn
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b5:4b:5e:a7:57:ac:05:72:11:73:eb:e1:c9:18:
|
||||
3c:44:cf:98:c1:00:26:4b:db:ad:1f:2c:32:e5:4b:
|
||||
e8:e3:00:31:8c:24:84:42:f3:7a:53:7f:e8:c1:89:
|
||||
08:8a:9b:b6:cc:d2:68:17:21:4e:2d:03:ae:58:4e:
|
||||
71:ea:46:8d:a2:85:18:0e:33:11:6b:ed:82:b3:f0:
|
||||
ef:d9:55:7c:22:f3:cf:e3:6a:e0:55:5c:34:c0:44:
|
||||
64:ca:bb:80:46:d6:0f:4a:c9:9d:60:fb:ff:d7:20:
|
||||
4f:ba:76:09:b0:ce:96:66:e4:7f:90:c1:c3:ae:d2:
|
||||
b6:6b:f2:06:7d:d0:77:f2:8b:25:e9:01:dc:9e:e9:
|
||||
1f:97:cd:19:6e:ef:5d:b2:eb:61:aa:33:c3:0a:f0:
|
||||
d0:58:c3:2a:57:85:a9:f7:37:ec:3a:a5:c5:56:46:
|
||||
b4:df:71:3f:1d:c0:29:e1:0d:c5:17:cf:bb:bc:cc:
|
||||
c9:86:d8:6e:93:4a:63:8e:46:d1:03:d1:18:23:f6:
|
||||
f5:32:88:b3:e1:c0:4f:30:16:15:b7:e7:64:99:e1:
|
||||
59:54:2d:1d:ac:7f:74:3f:9b:da:c5:4d:3f:3b:2a:
|
||||
92:36:e4:3e:af:0a:d8:51:d2:17:a4:7f:d0:96:8e:
|
||||
79:27:85:db:75:dd:36:7b:ac:0a:d3:b0:25:db:a0:
|
||||
4a:b5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost, DNS:localhost1, DNS:localhost2
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
BD:FE:8D:9C:5D:FF:AC:9B:EC:06:1C:24:60:6A:DA:C1:58:54:40:40
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
01:5f:58:90:09:4c:e5:f2:f6:0c:73:ac:43:75:34:79:7c:5a:
|
||||
2b:e6:43:33:40:1b:5e:97:75:09:44:98:dd:8b:61:d2:8a:d2:
|
||||
be:d8:04:10:5c:eb:82:11:23:8f:dd:53:51:fa:dc:07:6a:d3:
|
||||
f2:8b:9b:63:1b:22:6b:07:b6:02:7c:dd:e7:ea:33:34:da:ea:
|
||||
48:22:ee:c8:bb:26:d3:b8:7e:f7:6b:46:07:ea:6a:1a:20:94:
|
||||
7a:3f:2a:a1:5a:c5:e7:95:58:b9:9c:95:9f:db:2f:1d:ab:fe:
|
||||
1b:d8:97:88:29:28:05:86:15:57:cc:52:25:26:8c:84:48:ea:
|
||||
33:d7:3c:32:4c:58:96:34:2e:3c:27:2d:72:24:c3:96:93:42:
|
||||
48:c4:9f:c5:b3:29:56:30:e2:e0:d1:53:e2:f5:07:71:b1:74:
|
||||
6d:bc:8c:c8:30:ca:90:74:8a:61:49:13:99:7b:77:1d:d0:91:
|
||||
7f:ad:11:73:ab:ce:0b:8d:67:65:38:7e:a7:5f:f1:76:14:4e:
|
||||
90:9b:04:ec:e9:27:45:45:b5:45:02:2c:3b:e4:37:46:5e:93:
|
||||
fc:b5:19:c7:4f:a3:cb:df:25:7d:6f:7e:31:93:3c:4a:9f:71:
|
||||
19:9b:ef:d5:01:6c:48:40:7f:91:16:82:c8:71:29:2e:2a:4e:
|
||||
a0:0e:99:b3
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQiMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
||||
DwAwggEKAoIBAQC1S16nV6wFchFz6+HJGDxEz5jBACZL260fLDLlS+jjADGMJIRC
|
||||
83pTf+jBiQiKm7bM0mgXIU4tA65YTnHqRo2ihRgOMxFr7YKz8O/ZVXwi88/jauBV
|
||||
XDTARGTKu4BG1g9KyZ1g+//XIE+6dgmwzpZm5H+QwcOu0rZr8gZ90HfyiyXpAdye
|
||||
6R+XzRlu712y62GqM8MK8NBYwypXhan3N+w6pcVWRrTfcT8dwCnhDcUXz7u8zMmG
|
||||
2G6TSmOORtED0Rgj9vUyiLPhwE8wFhW352SZ4VlULR2sf3Q/m9rFTT87KpI25D6v
|
||||
CthR0hekf9CWjnknhdt13TZ7rArTsCXboEq1AgMBAAGjggEeMIIBGjAsBgNVHREE
|
||||
JTAjgglsb2NhbGhvc3SCCmxvY2FsaG9zdDGCCmxvY2FsaG9zdDIwCwYDVR0PBAQD
|
||||
AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBS9/o2cXf+sm+wGHCRg
|
||||
atrBWFRAQDAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
|
||||
AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
|
||||
bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
|
||||
Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
|
||||
AAOCAQEAAV9YkAlM5fL2DHOsQ3U0eXxaK+ZDM0AbXpd1CUSY3Yth0orSvtgEEFzr
|
||||
ghEjj91TUfrcB2rT8oubYxsiawe2Anzd5+ozNNrqSCLuyLsm07h+92tGB+pqGiCU
|
||||
ej8qoVrF55VYuZyVn9svHav+G9iXiCkoBYYVV8xSJSaMhEjqM9c8MkxYljQuPCct
|
||||
ciTDlpNCSMSfxbMpVjDi4NFT4vUHcbF0bbyMyDDKkHSKYUkTmXt3HdCRf60Rc6vO
|
||||
C41nZTh+p1/xdhROkJsE7OknRUW1RQIsO+Q3Rl6T/LUZx0+jy98lfW9+MZM8Sp9x
|
||||
GZvv1QFsSEB/kRaCyHEpLipOoA6Zsw==
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,27 +0,0 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEpAIBAAKCAQEAtUtep1esBXIRc+vhyRg8RM+YwQAmS9utHywy5Uvo4wAxjCSE
|
||||
QvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaNooUYDjMRa+2Cs/Dv2VV8IvPP42rg
|
||||
VVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6WZuR/kMHDrtK2a/IGfdB38osl6QHc
|
||||
nukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfsOqXFVka033E/HcAp4Q3FF8+7vMzJ
|
||||
hthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dkmeFZVC0drH90P5vaxU0/OyqSNuQ+
|
||||
rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BKtQIDAQABAoIBAQCmYwn4I6qpRMtn
|
||||
zLFoUmnd7XmQiIadUHxPA82iTEztKZxPtqP8nmFCiT4hgZbpP4hB60nFELgi8CHu
|
||||
wfAix6Xt5qDxR0VR/KXcZ+B5Ys+PdJzzZ3+EWB/B5gNrXTKZ0JQwW2GpRR7FXc5O
|
||||
n069ipzWyheZz3u8037BC1uR1OaBHk/qift96QxENFSl6UXMNJwJndVZmnVzTsXK
|
||||
sPMtjWiXD36EZkaMB7kFZGYWLYqS+csA2jboPBLqcxuQ/rRjtocuchFrSzhdyR/9
|
||||
DZyo1aPdhTDaelt0Zfa1dZB2YEVpsUcgDF7oIIJwVKOlurylarMjQ45ZS4i89Gp5
|
||||
RaSQByaBAoGBAOWVvcunQIiagHUJkc3sHI1idI9LLi3Me/MfYHrNfaYy0rbJ2JxU
|
||||
sZdzcQ9Of9djb1M5Xu68RiTK+f6S3T90wba0LYAASwl7qGC1xpofRh/FlLzfjHgG
|
||||
VEVC6Rlm6Mjh2y4V4SP5J9XeiZDrGjtbXX3ZGH8YcO14SHGk4NvPhYrdAoGBAMon
|
||||
RBvUYZIUvWSYT+i5ZjYpo6kemwXG+nJfsux3ehB8aLbJbRQw3aGDvfh+wZy7qV4Z
|
||||
nZfFkg2xERaQ5XfgFclePwfgAk1SFUkBdmky+52mjKo2ggLuvSPN6c4RwuHM3LWe
|
||||
05wln0ZF5kKMHjjwl42OlOtVonutNItrc3wB8SW5AoGAJ3LkauLxPse1fObJC+Yf
|
||||
PdgGCT000R/KyIrCrDc0+OLQvCHQu4P+A/UNH0EwzFTEozs/aawmLVpHPIwFwkqQ
|
||||
opExJEZonleGJh/14TOwe/MaTJ3o6BLGViRaI0hAhYvxemi+B81fH+ueHa2YE0zu
|
||||
spokEGqltNgvMn/PN1XgL20CgYEAsf3w0jAl2OG6AKC7e0YC4R24pGf2Rxfz3FC2
|
||||
0c5BA9MGwCqKiISeIGBHHE0/XCk/70LOp5umBbgqO5xI70u24x7AkMaEQGBNrYJE
|
||||
KExjj2Pd5uEniD18+9GKU47/8KDYlHHMEGhv3QgevelxkuEED/fC15MHBa5z3W42
|
||||
uLFdCsECgYAnBY8y5gk5tegAajqOsm4qbHHqHtUxEaXONNHRYWDBndwLvnLjYjrt
|
||||
eKq+q3Jh2mXTk7vbgVj8gfq6lF5a5vE654gyeQ8pDVieKJoNow/omA5gwi0Rhwgy
|
||||
is0Ct82M+GaSaNBySglIhIjU744NpCIANdlBulioWs17/0gN/253fQ==
|
||||
-----END RSA PRIVATE KEY-----
|
||||
@ -1,166 +0,0 @@
|
||||
extensions = x509v3
|
||||
|
||||
[ x509v3 ]
|
||||
subjectAltName = DNS:localhost,DNS:localhost1,DNS:localhost2
|
||||
keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
||||
extendedKeyUsage = serverAuth
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid
|
||||
basicConstraints = CA:false
|
||||
authorityInfoAccess = @issuer_info
|
||||
crlDistributionPoints = @crl_info
|
||||
|
||||
[ crl_ext ]
|
||||
authorityKeyIdentifier = keyid:always
|
||||
authorityInfoAccess = @issuer_info
|
||||
|
||||
[ issuer_info ]
|
||||
caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
[ crl_info ]
|
||||
URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
[ req ]
|
||||
default_bits = 1024
|
||||
distinguished_name = req_DN
|
||||
default_md = sha256
|
||||
string_mask = utf8only
|
||||
|
||||
[ req_DN ]
|
||||
countryName = "Country Name is Northern Nowhere"
|
||||
countryName_value = NN
|
||||
organizationName = "Organization Name"
|
||||
organizationName_value = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = "Common Name"
|
||||
commonName_value = localhost.nn
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEpAIBAAKCAQEAtUtep1esBXIRc+vhyRg8RM+YwQAmS9utHywy5Uvo4wAxjCSE
|
||||
QvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaNooUYDjMRa+2Cs/Dv2VV8IvPP42rg
|
||||
VVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6WZuR/kMHDrtK2a/IGfdB38osl6QHc
|
||||
nukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfsOqXFVka033E/HcAp4Q3FF8+7vMzJ
|
||||
hthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dkmeFZVC0drH90P5vaxU0/OyqSNuQ+
|
||||
rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BKtQIDAQABAoIBAQCmYwn4I6qpRMtn
|
||||
zLFoUmnd7XmQiIadUHxPA82iTEztKZxPtqP8nmFCiT4hgZbpP4hB60nFELgi8CHu
|
||||
wfAix6Xt5qDxR0VR/KXcZ+B5Ys+PdJzzZ3+EWB/B5gNrXTKZ0JQwW2GpRR7FXc5O
|
||||
n069ipzWyheZz3u8037BC1uR1OaBHk/qift96QxENFSl6UXMNJwJndVZmnVzTsXK
|
||||
sPMtjWiXD36EZkaMB7kFZGYWLYqS+csA2jboPBLqcxuQ/rRjtocuchFrSzhdyR/9
|
||||
DZyo1aPdhTDaelt0Zfa1dZB2YEVpsUcgDF7oIIJwVKOlurylarMjQ45ZS4i89Gp5
|
||||
RaSQByaBAoGBAOWVvcunQIiagHUJkc3sHI1idI9LLi3Me/MfYHrNfaYy0rbJ2JxU
|
||||
sZdzcQ9Of9djb1M5Xu68RiTK+f6S3T90wba0LYAASwl7qGC1xpofRh/FlLzfjHgG
|
||||
VEVC6Rlm6Mjh2y4V4SP5J9XeiZDrGjtbXX3ZGH8YcO14SHGk4NvPhYrdAoGBAMon
|
||||
RBvUYZIUvWSYT+i5ZjYpo6kemwXG+nJfsux3ehB8aLbJbRQw3aGDvfh+wZy7qV4Z
|
||||
nZfFkg2xERaQ5XfgFclePwfgAk1SFUkBdmky+52mjKo2ggLuvSPN6c4RwuHM3LWe
|
||||
05wln0ZF5kKMHjjwl42OlOtVonutNItrc3wB8SW5AoGAJ3LkauLxPse1fObJC+Yf
|
||||
PdgGCT000R/KyIrCrDc0+OLQvCHQu4P+A/UNH0EwzFTEozs/aawmLVpHPIwFwkqQ
|
||||
opExJEZonleGJh/14TOwe/MaTJ3o6BLGViRaI0hAhYvxemi+B81fH+ueHa2YE0zu
|
||||
spokEGqltNgvMn/PN1XgL20CgYEAsf3w0jAl2OG6AKC7e0YC4R24pGf2Rxfz3FC2
|
||||
0c5BA9MGwCqKiISeIGBHHE0/XCk/70LOp5umBbgqO5xI70u24x7AkMaEQGBNrYJE
|
||||
KExjj2Pd5uEniD18+9GKU47/8KDYlHHMEGhv3QgevelxkuEED/fC15MHBa5z3W42
|
||||
uLFdCsECgYAnBY8y5gk5tegAajqOsm4qbHHqHtUxEaXONNHRYWDBndwLvnLjYjrt
|
||||
eKq+q3Jh2mXTk7vbgVj8gfq6lF5a5vE654gyeQ8pDVieKJoNow/omA5gwi0Rhwgy
|
||||
is0Ct82M+GaSaNBySglIhIjU744NpCIANdlBulioWs17/0gN/253fQ==
|
||||
-----END RSA PRIVATE KEY-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:22
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:48 2025 GMT
|
||||
Not After : Dec 31 11:51:48 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost.nn
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:b5:4b:5e:a7:57:ac:05:72:11:73:eb:e1:c9:18:
|
||||
3c:44:cf:98:c1:00:26:4b:db:ad:1f:2c:32:e5:4b:
|
||||
e8:e3:00:31:8c:24:84:42:f3:7a:53:7f:e8:c1:89:
|
||||
08:8a:9b:b6:cc:d2:68:17:21:4e:2d:03:ae:58:4e:
|
||||
71:ea:46:8d:a2:85:18:0e:33:11:6b:ed:82:b3:f0:
|
||||
ef:d9:55:7c:22:f3:cf:e3:6a:e0:55:5c:34:c0:44:
|
||||
64:ca:bb:80:46:d6:0f:4a:c9:9d:60:fb:ff:d7:20:
|
||||
4f:ba:76:09:b0:ce:96:66:e4:7f:90:c1:c3:ae:d2:
|
||||
b6:6b:f2:06:7d:d0:77:f2:8b:25:e9:01:dc:9e:e9:
|
||||
1f:97:cd:19:6e:ef:5d:b2:eb:61:aa:33:c3:0a:f0:
|
||||
d0:58:c3:2a:57:85:a9:f7:37:ec:3a:a5:c5:56:46:
|
||||
b4:df:71:3f:1d:c0:29:e1:0d:c5:17:cf:bb:bc:cc:
|
||||
c9:86:d8:6e:93:4a:63:8e:46:d1:03:d1:18:23:f6:
|
||||
f5:32:88:b3:e1:c0:4f:30:16:15:b7:e7:64:99:e1:
|
||||
59:54:2d:1d:ac:7f:74:3f:9b:da:c5:4d:3f:3b:2a:
|
||||
92:36:e4:3e:af:0a:d8:51:d2:17:a4:7f:d0:96:8e:
|
||||
79:27:85:db:75:dd:36:7b:ac:0a:d3:b0:25:db:a0:
|
||||
4a:b5
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost, DNS:localhost1, DNS:localhost2
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
BD:FE:8D:9C:5D:FF:AC:9B:EC:06:1C:24:60:6A:DA:C1:58:54:40:40
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
01:5f:58:90:09:4c:e5:f2:f6:0c:73:ac:43:75:34:79:7c:5a:
|
||||
2b:e6:43:33:40:1b:5e:97:75:09:44:98:dd:8b:61:d2:8a:d2:
|
||||
be:d8:04:10:5c:eb:82:11:23:8f:dd:53:51:fa:dc:07:6a:d3:
|
||||
f2:8b:9b:63:1b:22:6b:07:b6:02:7c:dd:e7:ea:33:34:da:ea:
|
||||
48:22:ee:c8:bb:26:d3:b8:7e:f7:6b:46:07:ea:6a:1a:20:94:
|
||||
7a:3f:2a:a1:5a:c5:e7:95:58:b9:9c:95:9f:db:2f:1d:ab:fe:
|
||||
1b:d8:97:88:29:28:05:86:15:57:cc:52:25:26:8c:84:48:ea:
|
||||
33:d7:3c:32:4c:58:96:34:2e:3c:27:2d:72:24:c3:96:93:42:
|
||||
48:c4:9f:c5:b3:29:56:30:e2:e0:d1:53:e2:f5:07:71:b1:74:
|
||||
6d:bc:8c:c8:30:ca:90:74:8a:61:49:13:99:7b:77:1d:d0:91:
|
||||
7f:ad:11:73:ab:ce:0b:8d:67:65:38:7e:a7:5f:f1:76:14:4e:
|
||||
90:9b:04:ec:e9:27:45:45:b5:45:02:2c:3b:e4:37:46:5e:93:
|
||||
fc:b5:19:c7:4f:a3:cb:df:25:7d:6f:7e:31:93:3c:4a:9f:71:
|
||||
19:9b:ef:d5:01:6c:48:40:7f:91:16:82:c8:71:29:2e:2a:4e:
|
||||
a0:0e:99:b3
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQiMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
||||
DwAwggEKAoIBAQC1S16nV6wFchFz6+HJGDxEz5jBACZL260fLDLlS+jjADGMJIRC
|
||||
83pTf+jBiQiKm7bM0mgXIU4tA65YTnHqRo2ihRgOMxFr7YKz8O/ZVXwi88/jauBV
|
||||
XDTARGTKu4BG1g9KyZ1g+//XIE+6dgmwzpZm5H+QwcOu0rZr8gZ90HfyiyXpAdye
|
||||
6R+XzRlu712y62GqM8MK8NBYwypXhan3N+w6pcVWRrTfcT8dwCnhDcUXz7u8zMmG
|
||||
2G6TSmOORtED0Rgj9vUyiLPhwE8wFhW352SZ4VlULR2sf3Q/m9rFTT87KpI25D6v
|
||||
CthR0hekf9CWjnknhdt13TZ7rArTsCXboEq1AgMBAAGjggEeMIIBGjAsBgNVHREE
|
||||
JTAjgglsb2NhbGhvc3SCCmxvY2FsaG9zdDGCCmxvY2FsaG9zdDIwCwYDVR0PBAQD
|
||||
AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBS9/o2cXf+sm+wGHCRg
|
||||
atrBWFRAQDAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
|
||||
AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
|
||||
bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
|
||||
Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
|
||||
AAOCAQEAAV9YkAlM5fL2DHOsQ3U0eXxaK+ZDM0AbXpd1CUSY3Yth0orSvtgEEFzr
|
||||
ghEjj91TUfrcB2rT8oubYxsiawe2Anzd5+ozNNrqSCLuyLsm07h+92tGB+pqGiCU
|
||||
ej8qoVrF55VYuZyVn9svHav+G9iXiCkoBYYVV8xSJSaMhEjqM9c8MkxYljQuPCct
|
||||
ciTDlpNCSMSfxbMpVjDi4NFT4vUHcbF0bbyMyDDKkHSKYUkTmXt3HdCRf60Rc6vO
|
||||
C41nZTh+p1/xdhROkJsE7OknRUW1RQIsO+Q3Rl6T/LUZx0+jy98lfW9+MZM8Sp9x
|
||||
GZvv1QFsSEB/kRaCyHEpLipOoA6Zsw==
|
||||
-----END CERTIFICATE-----
|
||||
Binary file not shown.
@ -1,9 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtUtep1esBXIRc+vhyRg8
|
||||
RM+YwQAmS9utHywy5Uvo4wAxjCSEQvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaN
|
||||
ooUYDjMRa+2Cs/Dv2VV8IvPP42rgVVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6W
|
||||
ZuR/kMHDrtK2a/IGfdB38osl6QHcnukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfs
|
||||
OqXFVka033E/HcAp4Q3FF8+7vMzJhthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dk
|
||||
meFZVC0drH90P5vaxU0/OyqSNuQ+rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BK
|
||||
tQIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
@ -1,38 +0,0 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIGsjCCBZoCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
|
||||
BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
|
||||
BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
|
||||
NDhaFw0yNTA0MDUxMTUxNDhaMIIE7DAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
|
||||
NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
|
||||
MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
|
||||
8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
|
||||
AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
|
||||
MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
|
||||
DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
|
||||
NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
|
||||
OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
|
||||
MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
|
||||
8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
|
||||
AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
|
||||
MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
|
||||
DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
|
||||
NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
|
||||
OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
|
||||
MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
|
||||
8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
|
||||
AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
|
||||
MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
|
||||
DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
|
||||
NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
|
||||
NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
|
||||
MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
|
||||
8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa
|
||||
AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFowGgIJAIE0yC2B8FQiFw0yNTAzMDYx
|
||||
MTUxNDhaMBoCCQCBNMgtgfBUIxcNMjUwMzA2MTE1MTQ4WqAOMAwwCgYDVR0UBAMC
|
||||
AQEwDQYJKoZIhvcNAQELBQADggEBAFK6ak0zPfAUcLzWQzecy/frPTjPuNTzaEsO
|
||||
AOEbQbvJuCfgjCwFpvD4KaSz3pRUs0/TCaOh3lit09sGrGp50k1NWu7DOGc4bDL9
|
||||
dYUjhv0x9oozbrFRtfazme1QtG8wpLWnYtxDCTRwDllRyiHsZ8dEL11EKc26tt6D
|
||||
dHpnaF5uSMfCJiSsLfDHVabPLFfnU3rqvh02Z8OrOeVaC7T370pjh5xzBHaCqEA3
|
||||
zvOeP0XPIDNJ9/KR0+moPIWORbrrcM3VNNsearXej9urthnhziynFRh+QQg1tVzK
|
||||
zzrTTrcsKkuR0JMisOLGoqWY6UaAMrp03t4NkSgFoVXH7xBI3Gs=
|
||||
-----END X509 CRL-----
|
||||
@ -1,104 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:23
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:48 2025 GMT
|
||||
Not After : Dec 31 11:51:48 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost.nn
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ca:6d:71:a2:7a:bb:12:f6:c0:c3:c9:bf:65:6f:
|
||||
cb:a3:79:1f:dd:52:bd:8e:0e:72:ea:8d:07:c1:b5:
|
||||
a6:73:c9:66:e5:00:e1:ed:32:88:d8:69:9d:91:08:
|
||||
a3:af:20:9d:18:16:a9:e0:19:18:2f:74:47:e7:bc:
|
||||
43:83:f7:df:08:33:0a:a1:c4:af:4f:e5:f8:26:d6:
|
||||
96:10:61:47:e0:87:f7:24:69:17:7c:eb:b6:01:13:
|
||||
59:0b:61:10:46:25:04:e0:8c:50:88:35:26:64:ce:
|
||||
e0:20:ea:2d:3b:fe:98:c8:fc:f1:94:7a:c7:d3:93:
|
||||
6f:89:34:b5:62:ad:d1:67:2b:b1:b3:a9:ca:5a:8d:
|
||||
64:ba:04:f5:67:50:5e:73:35:9a:4b:07:8f:f5:4a:
|
||||
86:36:9e:e4:1d:c3:e4:87:8c:00:43:d3:c6:0d:e7:
|
||||
be:07:40:cd:ee:6e:b1:bb:1d:ca:93:c8:57:f4:a7:
|
||||
d5:66:af:a5:8b:7c:bc:28:44:b0:1b:e9:6b:e5:fb:
|
||||
7d:ee:54:be:cc:93:df:ce:ab:5f:69:c2:cf:04:bf:
|
||||
df:5c:b4:e2:b3:01:85:5b:f6:ac:11:6f:57:00:af:
|
||||
3e:b5:a4:d3:7a:08:96:4b:41:cc:68:09:4c:9e:37:
|
||||
cf:0b:fc:52:cb:64:d5:96:b9:c2:1e:93:f2:da:0c:
|
||||
70:a9
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost1, DNS:localhost2, DNS:localhost
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
D6:04:68:12:9C:5A:27:70:6B:D6:89:55:C1:6B:11:78:DD:74:D8:32
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
60:7a:35:3f:a7:9b:44:14:cf:8a:9d:38:46:3c:7a:93:43:19:
|
||||
9d:ed:f3:21:32:50:7a:f8:b4:e6:90:d1:5e:26:75:1c:fd:ed:
|
||||
64:b2:fe:5a:9c:96:f6:5b:2d:df:86:7d:4c:87:fa:8f:1d:13:
|
||||
67:f2:f5:91:aa:f9:1b:c3:f7:54:da:17:43:49:00:ad:9e:55:
|
||||
53:43:c1:30:4e:6b:9e:f6:99:26:b1:fa:35:85:d5:d1:70:88:
|
||||
30:87:8e:d3:91:b9:85:fa:b8:e2:31:06:9c:17:c8:2a:2f:9b:
|
||||
e6:e8:5c:c7:6e:57:36:f5:c7:78:a2:9b:01:ef:8d:d5:38:ec:
|
||||
1f:f0:ee:7f:d4:0b:b8:82:1d:01:3a:65:46:47:ba:58:9f:d1:
|
||||
4d:95:18:17:e4:23:4a:76:54:c6:70:5d:fd:ac:f2:83:1d:ed:
|
||||
66:2b:a2:97:28:aa:e3:7f:bd:f2:02:8b:2f:43:fe:c1:74:36:
|
||||
8f:87:60:de:51:0b:44:0a:c4:98:b6:4d:94:e5:ec:ce:72:25:
|
||||
66:66:8e:1c:86:aa:30:5c:57:75:8a:28:eb:b3:51:93:84:45:
|
||||
6a:f7:ce:52:ac:1b:a8:0d:37:df:e4:60:a2:96:18:cf:29:66:
|
||||
a9:e2:08:52:e6:2a:3a:29:8b:3a:28:b1:df:4d:d4:0c:b6:9b:
|
||||
e2:40:b2:33
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQjMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
||||
DwAwggEKAoIBAQDKbXGiersS9sDDyb9lb8ujeR/dUr2ODnLqjQfBtaZzyWblAOHt
|
||||
MojYaZ2RCKOvIJ0YFqngGRgvdEfnvEOD998IMwqhxK9P5fgm1pYQYUfgh/ckaRd8
|
||||
67YBE1kLYRBGJQTgjFCINSZkzuAg6i07/pjI/PGUesfTk2+JNLVirdFnK7Gzqcpa
|
||||
jWS6BPVnUF5zNZpLB4/1SoY2nuQdw+SHjABD08YN574HQM3ubrG7HcqTyFf0p9Vm
|
||||
r6WLfLwoRLAb6Wvl+33uVL7Mk9/Oq19pws8Ev99ctOKzAYVb9qwRb1cArz61pNN6
|
||||
CJZLQcxoCUyeN88L/FLLZNWWucIek/LaDHCpAgMBAAGjggEeMIIBGjAsBgNVHREE
|
||||
JTAjggpsb2NhbGhvc3Qxggpsb2NhbGhvc3Qygglsb2NhbGhvc3QwCwYDVR0PBAQD
|
||||
AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBTWBGgSnFoncGvWiVXB
|
||||
axF43XTYMjAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
|
||||
AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
|
||||
bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
|
||||
Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
|
||||
AAOCAQEAYHo1P6ebRBTPip04Rjx6k0MZne3zITJQevi05pDRXiZ1HP3tZLL+WpyW
|
||||
9lst34Z9TIf6jx0TZ/L1kar5G8P3VNoXQ0kArZ5VU0PBME5rnvaZJrH6NYXV0XCI
|
||||
MIeO05G5hfq44jEGnBfIKi+b5uhcx25XNvXHeKKbAe+N1TjsH/Duf9QLuIIdATpl
|
||||
Rke6WJ/RTZUYF+QjSnZUxnBd/azygx3tZiuilyiq43+98gKLL0P+wXQ2j4dg3lEL
|
||||
RArEmLZNlOXsznIlZmaOHIaqMFxXdYoo67NRk4RFavfOUqwbqA033+RgopYYzylm
|
||||
qeIIUuYqOimLOiix303UDLab4kCyMw==
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,27 +0,0 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEowIBAAKCAQEAym1xonq7EvbAw8m/ZW/Lo3kf3VK9jg5y6o0HwbWmc8lm5QDh
|
||||
7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ffCDMKocSvT+X4JtaWEGFH4If3JGkX
|
||||
fOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6YyPzxlHrH05NviTS1Yq3RZyuxs6nK
|
||||
Wo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wAQ9PGDee+B0DN7m6xux3Kk8hX9KfV
|
||||
Zq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLPBL/fXLTiswGFW/asEW9XAK8+taTT
|
||||
egiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxwqQIDAQABAoIBAG6l+jpVGdLY3C9p
|
||||
JNyeilJWEAvbgU+YKEp7QmUpFM4vpbXBkL0mJVUeDgnMDiTZD+Wt5bdgIC84QWGz
|
||||
L7iAEgKaW9Jm/2kODGG2ZBqaAj8CMx5M75DSCw91cvPcX5fn/k17hT2ex9jMmAiF
|
||||
2Kn1lbAvSyHdJ0NIUOxPymIhHthkOgVLDBePx17YY+TvNV5Q7VF89wH2ip7btCdP
|
||||
Zkf831V8XBHTmb9QiA01txXZBUYyDfC1qiU6dg/R56zuMVBbyxqA7jJwanDhOdLP
|
||||
prhJHo7Ic6yha6kPI1crPcJ9Uves4M2fcRYVh3NzSYGN16GKyRBTrbPh+9QRD5dA
|
||||
fPrvnW0CgYEA4/TX009DWuAmiT+hR/b5pjORvIOnAsVyXDKmVrzCdQ9EgW+VbR6a
|
||||
5vPEm4auN2CV9xKtzKVo2nVKHHfuaM3sdaa2dP7yXCwhQT/gfoP77MYJ9aKw754L
|
||||
SCErdVsc59u3YAn6o5Sk9n1LiqGT1aGlKgsaEPrJsJXoWJoWshVHvX8CgYEA41Sa
|
||||
4toCdk/0g22S0Kt7qjX1WrVlQEzcjqSXotlvnPQ7N5FsyBoE/NO7uozZM+rjgvGD
|
||||
9TJMF//v+0MSZQPJstWgX4uC2f0HnRQH51Y3kvVC62JLaPEGW7aeq/LDrW5cfiDa
|
||||
tlIB+V5cYl7STOR5A4arqNhu9EecChAZCEnvNdcCgYBQBX1WIncEibc9aubU+m/8
|
||||
1hGM2bJhGKrijq0xuaWRrkBgJ6mO2rWJ6XzVE9xIeFFsoFP+iPpb5dyUTc2VYORn
|
||||
EJTwUScHED7ERwYpo29mWMbaQbhXBWX0diBpXAizo7+lqRshHWcjWCySh9H7pnjy
|
||||
X19RIph2sskTgVQCQ9IhRQKBgEMofm1gHHQZYNHm8AWHc4wwTqCSkCvzyQC27Tkl
|
||||
5UxH9qqO4sUmsqyCXKZa79vfm4DWmrY4OrSoXpwrD2caPF8Br1QqoeiGUNZ90Wvt
|
||||
U5OtsyxYqJCDC+7SP4PqvxYgUWDNke9kwMKLtt00yAoBQSLiiRnjfrvZ3+Y1JUAG
|
||||
n42XAoGBAL122wLSCLNuYjcZoQ+scTNmIOf9UV2tAudui/ALLPBL/NjGagisA+cQ
|
||||
HlnpzuofsWz6SqBxdZEH6rajp0q5GJ5kj6E7odd3ArKqp7BY7UqoId9bpXgmigIL
|
||||
Jhpje0SvYJ/9DDlHTjO1xGOG0WFlztb1x0iZxMFMXY/d/XZQQdzm
|
||||
-----END RSA PRIVATE KEY-----
|
||||
@ -1,166 +0,0 @@
|
||||
extensions = x509v3
|
||||
|
||||
[ x509v3 ]
|
||||
subjectAltName = DNS:localhost1,DNS:localhost2,DNS:localhost
|
||||
keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
||||
extendedKeyUsage = serverAuth
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid
|
||||
basicConstraints = CA:false
|
||||
authorityInfoAccess = @issuer_info
|
||||
crlDistributionPoints = @crl_info
|
||||
|
||||
[ crl_ext ]
|
||||
authorityKeyIdentifier = keyid:always
|
||||
authorityInfoAccess = @issuer_info
|
||||
|
||||
[ issuer_info ]
|
||||
caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
[ crl_info ]
|
||||
URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
[ req ]
|
||||
default_bits = 1024
|
||||
distinguished_name = req_DN
|
||||
default_md = sha256
|
||||
string_mask = utf8only
|
||||
|
||||
[ req_DN ]
|
||||
countryName = "Country Name is Northern Nowhere"
|
||||
countryName_value = NN
|
||||
organizationName = "Organization Name"
|
||||
organizationName_value = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = "Common Name"
|
||||
commonName_value = localhost.nn
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEowIBAAKCAQEAym1xonq7EvbAw8m/ZW/Lo3kf3VK9jg5y6o0HwbWmc8lm5QDh
|
||||
7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ffCDMKocSvT+X4JtaWEGFH4If3JGkX
|
||||
fOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6YyPzxlHrH05NviTS1Yq3RZyuxs6nK
|
||||
Wo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wAQ9PGDee+B0DN7m6xux3Kk8hX9KfV
|
||||
Zq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLPBL/fXLTiswGFW/asEW9XAK8+taTT
|
||||
egiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxwqQIDAQABAoIBAG6l+jpVGdLY3C9p
|
||||
JNyeilJWEAvbgU+YKEp7QmUpFM4vpbXBkL0mJVUeDgnMDiTZD+Wt5bdgIC84QWGz
|
||||
L7iAEgKaW9Jm/2kODGG2ZBqaAj8CMx5M75DSCw91cvPcX5fn/k17hT2ex9jMmAiF
|
||||
2Kn1lbAvSyHdJ0NIUOxPymIhHthkOgVLDBePx17YY+TvNV5Q7VF89wH2ip7btCdP
|
||||
Zkf831V8XBHTmb9QiA01txXZBUYyDfC1qiU6dg/R56zuMVBbyxqA7jJwanDhOdLP
|
||||
prhJHo7Ic6yha6kPI1crPcJ9Uves4M2fcRYVh3NzSYGN16GKyRBTrbPh+9QRD5dA
|
||||
fPrvnW0CgYEA4/TX009DWuAmiT+hR/b5pjORvIOnAsVyXDKmVrzCdQ9EgW+VbR6a
|
||||
5vPEm4auN2CV9xKtzKVo2nVKHHfuaM3sdaa2dP7yXCwhQT/gfoP77MYJ9aKw754L
|
||||
SCErdVsc59u3YAn6o5Sk9n1LiqGT1aGlKgsaEPrJsJXoWJoWshVHvX8CgYEA41Sa
|
||||
4toCdk/0g22S0Kt7qjX1WrVlQEzcjqSXotlvnPQ7N5FsyBoE/NO7uozZM+rjgvGD
|
||||
9TJMF//v+0MSZQPJstWgX4uC2f0HnRQH51Y3kvVC62JLaPEGW7aeq/LDrW5cfiDa
|
||||
tlIB+V5cYl7STOR5A4arqNhu9EecChAZCEnvNdcCgYBQBX1WIncEibc9aubU+m/8
|
||||
1hGM2bJhGKrijq0xuaWRrkBgJ6mO2rWJ6XzVE9xIeFFsoFP+iPpb5dyUTc2VYORn
|
||||
EJTwUScHED7ERwYpo29mWMbaQbhXBWX0diBpXAizo7+lqRshHWcjWCySh9H7pnjy
|
||||
X19RIph2sskTgVQCQ9IhRQKBgEMofm1gHHQZYNHm8AWHc4wwTqCSkCvzyQC27Tkl
|
||||
5UxH9qqO4sUmsqyCXKZa79vfm4DWmrY4OrSoXpwrD2caPF8Br1QqoeiGUNZ90Wvt
|
||||
U5OtsyxYqJCDC+7SP4PqvxYgUWDNke9kwMKLtt00yAoBQSLiiRnjfrvZ3+Y1JUAG
|
||||
n42XAoGBAL122wLSCLNuYjcZoQ+scTNmIOf9UV2tAudui/ALLPBL/NjGagisA+cQ
|
||||
HlnpzuofsWz6SqBxdZEH6rajp0q5GJ5kj6E7odd3ArKqp7BY7UqoId9bpXgmigIL
|
||||
Jhpje0SvYJ/9DDlHTjO1xGOG0WFlztb1x0iZxMFMXY/d/XZQQdzm
|
||||
-----END RSA PRIVATE KEY-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:23
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:48 2025 GMT
|
||||
Not After : Dec 31 11:51:48 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost.nn
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ca:6d:71:a2:7a:bb:12:f6:c0:c3:c9:bf:65:6f:
|
||||
cb:a3:79:1f:dd:52:bd:8e:0e:72:ea:8d:07:c1:b5:
|
||||
a6:73:c9:66:e5:00:e1:ed:32:88:d8:69:9d:91:08:
|
||||
a3:af:20:9d:18:16:a9:e0:19:18:2f:74:47:e7:bc:
|
||||
43:83:f7:df:08:33:0a:a1:c4:af:4f:e5:f8:26:d6:
|
||||
96:10:61:47:e0:87:f7:24:69:17:7c:eb:b6:01:13:
|
||||
59:0b:61:10:46:25:04:e0:8c:50:88:35:26:64:ce:
|
||||
e0:20:ea:2d:3b:fe:98:c8:fc:f1:94:7a:c7:d3:93:
|
||||
6f:89:34:b5:62:ad:d1:67:2b:b1:b3:a9:ca:5a:8d:
|
||||
64:ba:04:f5:67:50:5e:73:35:9a:4b:07:8f:f5:4a:
|
||||
86:36:9e:e4:1d:c3:e4:87:8c:00:43:d3:c6:0d:e7:
|
||||
be:07:40:cd:ee:6e:b1:bb:1d:ca:93:c8:57:f4:a7:
|
||||
d5:66:af:a5:8b:7c:bc:28:44:b0:1b:e9:6b:e5:fb:
|
||||
7d:ee:54:be:cc:93:df:ce:ab:5f:69:c2:cf:04:bf:
|
||||
df:5c:b4:e2:b3:01:85:5b:f6:ac:11:6f:57:00:af:
|
||||
3e:b5:a4:d3:7a:08:96:4b:41:cc:68:09:4c:9e:37:
|
||||
cf:0b:fc:52:cb:64:d5:96:b9:c2:1e:93:f2:da:0c:
|
||||
70:a9
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost1, DNS:localhost2, DNS:localhost
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
D6:04:68:12:9C:5A:27:70:6B:D6:89:55:C1:6B:11:78:DD:74:D8:32
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
60:7a:35:3f:a7:9b:44:14:cf:8a:9d:38:46:3c:7a:93:43:19:
|
||||
9d:ed:f3:21:32:50:7a:f8:b4:e6:90:d1:5e:26:75:1c:fd:ed:
|
||||
64:b2:fe:5a:9c:96:f6:5b:2d:df:86:7d:4c:87:fa:8f:1d:13:
|
||||
67:f2:f5:91:aa:f9:1b:c3:f7:54:da:17:43:49:00:ad:9e:55:
|
||||
53:43:c1:30:4e:6b:9e:f6:99:26:b1:fa:35:85:d5:d1:70:88:
|
||||
30:87:8e:d3:91:b9:85:fa:b8:e2:31:06:9c:17:c8:2a:2f:9b:
|
||||
e6:e8:5c:c7:6e:57:36:f5:c7:78:a2:9b:01:ef:8d:d5:38:ec:
|
||||
1f:f0:ee:7f:d4:0b:b8:82:1d:01:3a:65:46:47:ba:58:9f:d1:
|
||||
4d:95:18:17:e4:23:4a:76:54:c6:70:5d:fd:ac:f2:83:1d:ed:
|
||||
66:2b:a2:97:28:aa:e3:7f:bd:f2:02:8b:2f:43:fe:c1:74:36:
|
||||
8f:87:60:de:51:0b:44:0a:c4:98:b6:4d:94:e5:ec:ce:72:25:
|
||||
66:66:8e:1c:86:aa:30:5c:57:75:8a:28:eb:b3:51:93:84:45:
|
||||
6a:f7:ce:52:ac:1b:a8:0d:37:df:e4:60:a2:96:18:cf:29:66:
|
||||
a9:e2:08:52:e6:2a:3a:29:8b:3a:28:b1:df:4d:d4:0c:b6:9b:
|
||||
e2:40:b2:33
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQjMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
||||
DwAwggEKAoIBAQDKbXGiersS9sDDyb9lb8ujeR/dUr2ODnLqjQfBtaZzyWblAOHt
|
||||
MojYaZ2RCKOvIJ0YFqngGRgvdEfnvEOD998IMwqhxK9P5fgm1pYQYUfgh/ckaRd8
|
||||
67YBE1kLYRBGJQTgjFCINSZkzuAg6i07/pjI/PGUesfTk2+JNLVirdFnK7Gzqcpa
|
||||
jWS6BPVnUF5zNZpLB4/1SoY2nuQdw+SHjABD08YN574HQM3ubrG7HcqTyFf0p9Vm
|
||||
r6WLfLwoRLAb6Wvl+33uVL7Mk9/Oq19pws8Ev99ctOKzAYVb9qwRb1cArz61pNN6
|
||||
CJZLQcxoCUyeN88L/FLLZNWWucIek/LaDHCpAgMBAAGjggEeMIIBGjAsBgNVHREE
|
||||
JTAjggpsb2NhbGhvc3Qxggpsb2NhbGhvc3Qygglsb2NhbGhvc3QwCwYDVR0PBAQD
|
||||
AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBTWBGgSnFoncGvWiVXB
|
||||
axF43XTYMjAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
|
||||
AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
|
||||
bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
|
||||
Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
|
||||
AAOCAQEAYHo1P6ebRBTPip04Rjx6k0MZne3zITJQevi05pDRXiZ1HP3tZLL+WpyW
|
||||
9lst34Z9TIf6jx0TZ/L1kar5G8P3VNoXQ0kArZ5VU0PBME5rnvaZJrH6NYXV0XCI
|
||||
MIeO05G5hfq44jEGnBfIKi+b5uhcx25XNvXHeKKbAe+N1TjsH/Duf9QLuIIdATpl
|
||||
Rke6WJ/RTZUYF+QjSnZUxnBd/azygx3tZiuilyiq43+98gKLL0P+wXQ2j4dg3lEL
|
||||
RArEmLZNlOXsznIlZmaOHIaqMFxXdYoo67NRk4RFavfOUqwbqA033+RgopYYzylm
|
||||
qeIIUuYqOimLOiix303UDLab4kCyMw==
|
||||
-----END CERTIFICATE-----
|
||||
Binary file not shown.
@ -1,9 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAym1xonq7EvbAw8m/ZW/L
|
||||
o3kf3VK9jg5y6o0HwbWmc8lm5QDh7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ff
|
||||
CDMKocSvT+X4JtaWEGFH4If3JGkXfOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6Y
|
||||
yPzxlHrH05NviTS1Yq3RZyuxs6nKWo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wA
|
||||
Q9PGDee+B0DN7m6xux3Kk8hX9KfVZq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLP
|
||||
BL/fXLTiswGFW/asEW9XAK8+taTTegiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxw
|
||||
qQIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
@ -1,36 +0,0 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIGQjCCBSoCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
|
||||
BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
|
||||
BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
|
||||
NDdaFw0yNTA0MDUxMTUxNDdaMIIEfDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
|
||||
NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
|
||||
MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
|
||||
8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
|
||||
AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
|
||||
MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
|
||||
DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
|
||||
NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
|
||||
OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
|
||||
MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
|
||||
8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
|
||||
AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
|
||||
MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
|
||||
DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
|
||||
NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
|
||||
OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
|
||||
MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
|
||||
8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
|
||||
AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
|
||||
MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
|
||||
DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
|
||||
NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
|
||||
NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
|
||||
MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
|
||||
8FQfFw0yNTAzMDYxMTUxNDdaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG9w0BAQsF
|
||||
AAOCAQEAhE75mBvf+4gkmovBP4FD6LOTNaafbtZiEBBub2nDkc2KiHJfvQzy08U9
|
||||
bnsxD9yAKk79wVGuBOgp9QHSabO6jodbf8UUJ97vYxE8LTE8gJKOS+CPFJz3fbS3
|
||||
3p+RLaSrcMXttHlP+BB6pl7Bo2srMVkF971HVPlvpZeCcLUdvidxUNwHd2ck93Xm
|
||||
ZzGod6s2H4RQ7TdPt+ARMzbysm3VNvMp10XVjmy/ytktkTIVvXqnLhNNTav144ya
|
||||
JEoPMTgtvPN+QI0jFiDb4RsUuhgD+AbS7MdYtxbml7wmiizvEh0i74GcZnNbEeln
|
||||
YgZR147KglS1zqANPeSsDvVoXm6a1w==
|
||||
-----END X509 CRL-----
|
||||
@ -1,103 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:1f
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:47 2025 GMT
|
||||
Not After : Dec 31 11:51:47 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:e6:0d:af:59:5e:53:57:3f:4e:c1:e2:f8:cf:30:
|
||||
65:dd:62:13:31:46:0b:d0:60:80:51:0d:09:33:8d:
|
||||
e1:b2:0f:0a:f2:fc:10:0b:e1:3a:69:43:c3:e9:eb:
|
||||
8b:45:8b:d5:26:0e:bd:c8:d4:a6:0f:1b:00:8d:74:
|
||||
36:60:30:a0:e0:24:c7:fa:dc:0c:e3:83:6c:8b:d1:
|
||||
fd:2a:a8:a3:d3:21:ff:c5:3c:47:1a:09:e1:8c:32:
|
||||
79:74:49:e9:f2:df:f7:4d:ac:b4:07:ec:81:40:27:
|
||||
65:b3:94:69:76:cd:57:1f:21:60:df:b4:7c:08:2f:
|
||||
33:fd:76:cc:23:c8:ed:1c:fb:bb:8a:74:2e:fe:7c:
|
||||
1d:d3:2f:22:2d:ff:11:7d:92:50:cc:c0:06:ac:95:
|
||||
a8:b3:06:42:83:09:1c:52:81:d1:14:21:bf:d1:b0:
|
||||
99:50:7a:6a:10:0c:30:d5:f0:e4:1a:c7:5d:1b:e9:
|
||||
be:be:c5:54:eb:e4:72:04:35:c4:14:a1:ba:20:45:
|
||||
2f:60:c8:e1:a1:de:b5:65:f7:2a:5d:05:d1:92:2d:
|
||||
22:ce:1a:ca:c2:35:fd:7c:f6:02:47:85:22:8c:5d:
|
||||
6e:4f:29:6b:3a:f9:84:73:89:4a:64:7b:9f:bd:fe:
|
||||
0a:4d:a0:08:7a:41:77:a3:dd:ba:c9:20:58:a1:7c:
|
||||
b8:b1
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
B4:23:96:D3:28:32:87:90:18:46:E5:2D:CD:D3:DB:4F:9B:92:76:79
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
43:b8:3e:47:2e:1c:8e:76:16:4d:c5:04:89:c9:d3:42:5c:af:
|
||||
97:27:da:6a:7f:bb:6d:49:51:0c:60:c7:0b:ce:8f:a3:33:26:
|
||||
ae:f8:75:fa:c8:43:65:b7:c1:a4:eb:bb:9b:50:e4:97:8f:78:
|
||||
b0:a7:00:95:5e:ac:3d:39:96:a6:39:a6:96:ad:5c:1b:e0:d3:
|
||||
81:91:25:f1:1c:bd:dd:70:d5:8d:44:03:6e:8c:93:66:98:fd:
|
||||
1d:66:b8:58:6a:90:11:26:44:3b:4e:8a:c4:ef:f7:4c:f4:57:
|
||||
ba:75:f5:dd:24:43:82:29:12:e8:4e:fc:9e:6f:a8:8e:e7:01:
|
||||
ff:56:e4:2d:62:02:99:a1:a9:fa:45:46:48:58:17:e8:ee:37:
|
||||
31:39:08:b6:a3:55:7e:6a:c5:3e:c0:1c:03:39:bc:64:d8:8d:
|
||||
7e:57:35:71:14:38:77:64:3a:3f:b4:4b:e8:10:31:a1:08:8c:
|
||||
2f:e8:de:d4:f8:a0:e6:07:3b:12:8e:12:83:eb:e3:ba:7c:91:
|
||||
b3:50:5e:f3:df:6d:3f:c1:70:f3:5c:e5:0c:84:1a:9d:5a:ae:
|
||||
bc:ac:53:f2:b6:e5:66:f8:00:c0:74:af:ed:e2:89:36:a6:c2:
|
||||
8b:90:8d:6c:23:a3:60:2e:49:1d:dd:d2:19:45:cb:cf:a4:c3:
|
||||
87:9c:fb:8f
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIERzCCAy+gAwIBAgIJAIE0yC2B8FQfMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFQxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQDmDa9ZXlNXP07B4vjPMGXdYhMxRgvQYIBRDQkzjeGyDwry/BAL4Tpp
|
||||
Q8Pp64tFi9UmDr3I1KYPGwCNdDZgMKDgJMf63Azjg2yL0f0qqKPTIf/FPEcaCeGM
|
||||
Mnl0Seny3/dNrLQH7IFAJ2WzlGl2zVcfIWDftHwILzP9dswjyO0c+7uKdC7+fB3T
|
||||
LyIt/xF9klDMwAaslaizBkKDCRxSgdEUIb/RsJlQemoQDDDV8OQax10b6b6+xVTr
|
||||
5HIENcQUobogRS9gyOGh3rVl9ypdBdGSLSLOGsrCNf189gJHhSKMXW5PKWs6+YRz
|
||||
iUpke5+9/gpNoAh6QXej3brJIFihfLixAgMBAAGjggEGMIIBAjAUBgNVHREEDTAL
|
||||
gglsb2NhbGhvc3QwCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0G
|
||||
A1UdDgQWBBS0I5bTKDKHkBhG5S3N09tPm5J2eTAfBgNVHSMEGDAWgBSdK86Vv9gi
|
||||
kaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEF
|
||||
BQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgG
|
||||
A1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxS
|
||||
b290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAQ7g+Ry4cjnYWTcUEicnTQlyvlyfa
|
||||
an+7bUlRDGDHC86PozMmrvh1+shDZbfBpOu7m1Dkl494sKcAlV6sPTmWpjmmlq1c
|
||||
G+DTgZEl8Ry93XDVjUQDboyTZpj9HWa4WGqQESZEO06KxO/3TPRXunX13SRDgikS
|
||||
6E78nm+ojucB/1bkLWICmaGp+kVGSFgX6O43MTkItqNVfmrFPsAcAzm8ZNiNflc1
|
||||
cRQ4d2Q6P7RL6BAxoQiML+je1Pig5gc7Eo4Sg+vjunyRs1Be899tP8Fw81zlDIQa
|
||||
nVquvKxT8rblZvgAwHSv7eKJNqbCi5CNbCOjYC5JHd3SGUXLz6TDh5z7jw==
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,27 +0,0 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEpAIBAAKCAQEA5g2vWV5TVz9OweL4zzBl3WITMUYL0GCAUQ0JM43hsg8K8vwQ
|
||||
C+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg4CTH+twM44Nsi9H9Kqij0yH/xTxH
|
||||
GgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1XHyFg37R8CC8z/XbMI8jtHPu7inQu
|
||||
/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHRFCG/0bCZUHpqEAww1fDkGsddG+m+
|
||||
vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXRki0izhrKwjX9fPYCR4UijF1uTylr
|
||||
OvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4sQIDAQABAoIBAQCorDH7sWgjmRwy
|
||||
lirdJlwZlFYEE5qH3qlWQ9uSPB3VwqfBfkR5oVqFYZUcRoInrJ3MOJS30gorGx4t
|
||||
mJ5hqmXZ0b36VSryCSMl5QHdLCZpoAz63PY4xjPj6gIY3DS2ybV18wFQqfweQISV
|
||||
xWQKIgYVohB4FMm36nwRA/Aq8J/BVgC/SIGJnDW2EGId5op20BdH7APedquXqzzp
|
||||
FwETV3hH7QDbdip+Td+5/Nnc9yLg4ecSvOLe5mLaGXgsxhNqAKnY5f3izMh+FTvx
|
||||
jgR12x/urhu4mwpKie7Y/JO+FsNJYevHHKYX1wUhGO2Puco4bCUiAecmrO4lFOMX
|
||||
auBjsCQtAoGBAPcnzQy8UIHBSxgUaQ2zEWtQNKg/lYy3BiM7rTq8HIAEggL5ylxv
|
||||
bP17tIQQZAhayaeR1BKL7yP8d5UlZedI9gzMP23mNsrxpC2BsmcBEZZQFRRFhWsD
|
||||
bnVWWQkx6KgVIDtZwQF1OhNUuZxUkTlXMSuSdNNVJADIHd8y7oxaGGvHAoGBAO5J
|
||||
Nj3L7eh9Eoh4iEMbyOu1iymE+jdzuY80wVBacMinjpmGE6wlIf/bvwb2/xGMd+Ix
|
||||
Sd60wCg/obN/62EAWaiJH88qrF5Uj+l2u1tmp3oRMOiBkXbLhEXzGP9Qcoa6s8gT
|
||||
HjatboUgCUuSQrY4OUu+wmqwufBh7poSGFUs/YfHAoGBAL5svgG3/ddbVD5jS2Ww
|
||||
uBUUoN2Yz+KxCVuQGTINyW+hCYK9bnq1pyXOcBDoiAof2QrwwpLfmgsB9CjHvbHr
|
||||
dxf5Lk3AeCr47uPY79mI60ICxZruzZLb+/kP5F2/RGBsln7j8l7rMSm/t5qJVbL2
|
||||
SP4nQzeoe6rWhJ15om4k5Hf1AoGAGpuGOQRKfoloxmBfJs81ckyFS4+TuRltAPat
|
||||
F2Hh8iXzoGT+UVycHUvWWtq9xKHgyRsj2oBobJYeYkLIb75wRId7S9DCCo56u2EM
|
||||
rroZvWGqCmxdZ9x12rG4etnqz+yNIqwv1X8sNiVLpGqilGJW04RrhSpSuOrWj9Gx
|
||||
ceFiNgUCgYBAAubXkD1rcIs2X8Ds3ztwYPaGL8ZX4q8eWvncgjz3YmVve408XD0w
|
||||
Sd44NWgjK2LXMv3ddXFdukoDmGm75KhDHWKO9vPBo0wpB5FXkMyHiDyM65X0MZC8
|
||||
xzSd9dUcy7TBjMVV2ge81b6U8nCwrdrU2L/0dzigmKnrLrF8MRjFLA==
|
||||
-----END RSA PRIVATE KEY-----
|
||||
@ -1,37 +0,0 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIGXjCCBUYCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
|
||||
BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
|
||||
BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
|
||||
NDhaFw0yNTA0MDUxMTUxNDhaMIIEmDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
|
||||
NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
|
||||
MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
|
||||
8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
|
||||
AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
|
||||
MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
|
||||
DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
|
||||
NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
|
||||
OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
|
||||
MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
|
||||
8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
|
||||
AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
|
||||
MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
|
||||
DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
|
||||
NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
|
||||
OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
|
||||
MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
|
||||
8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
|
||||
AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
|
||||
MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
|
||||
DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
|
||||
NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
|
||||
NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
|
||||
MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
|
||||
8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WqAO
|
||||
MAwwCgYDVR0UBAMCAQEwDQYJKoZIhvcNAQELBQADggEBABSYAYf7oUbmHOPkUk0p
|
||||
/rIqghCYWv9/PawRBI+ggCaMoC5jj9ppxNwXsI2FGrbN6vwpVbZ5mkF+gs3mNDlA
|
||||
fC0/Qj6IMuM/qRSFGXE4OQaQtYRH5BXFT4A0CiKhbBiDE8T8lHaLMIRWXP5phdoU
|
||||
X2FtZe/8Es+uyN1iF0KyNMFSIrFayEO4hUYH4KUxGgSq3vIp61JPRvQlHxl4g6jC
|
||||
OEH5Q7BLOd718Dzd5o1w9etaiOV8PqLmNd/t7BwX72I33XQyBOJ8sBtlB3y2LgfU
|
||||
CN7XlAEzF0+uFTClHHqndkw97+emgjjz/JVKH/M8kBQVQ2tcvbKTiJKhTS/Uw2cR
|
||||
uPw=
|
||||
-----END X509 CRL-----
|
||||
@ -1,104 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:20
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:47 2025 GMT
|
||||
Not After : Dec 31 11:51:47 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost.nn
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c8:04:06:3e:c7:71:90:6b:e3:ce:39:04:3d:70:
|
||||
5b:a2:50:fb:9e:9f:68:d9:36:f0:87:b9:82:65:3a:
|
||||
9a:2a:fe:37:e0:e0:96:f0:27:4b:c0:f2:01:33:11:
|
||||
ba:ba:06:3d:73:77:34:9f:0d:fd:d8:da:1e:bf:4d:
|
||||
64:d3:80:d0:65:e8:b5:25:cb:e9:d5:6e:2e:46:9c:
|
||||
2a:18:07:36:46:17:a2:db:89:08:13:f6:44:01:82:
|
||||
8f:45:8b:b4:a1:7b:8b:87:36:66:e0:3e:01:ad:0c:
|
||||
29:07:02:3d:5b:67:ec:0b:2e:c3:3b:c6:da:20:99:
|
||||
5f:cf:6d:f4:77:12:7b:be:1f:c3:b4:26:5c:f8:7e:
|
||||
86:39:7f:07:f8:12:15:36:47:0b:1b:f0:02:d6:65:
|
||||
5c:ba:19:ad:9f:b0:43:9f:54:49:4f:c8:0c:89:07:
|
||||
c4:78:91:c0:3d:64:87:ba:a3:30:a0:c7:15:2c:d1:
|
||||
a9:7c:cb:14:9e:8c:55:50:92:cc:ae:64:27:df:eb:
|
||||
54:86:a1:11:55:74:60:53:5b:cc:dc:9e:7a:85:9b:
|
||||
e5:e5:2e:03:a2:23:19:23:98:76:87:b1:4b:63:13:
|
||||
60:8e:ba:c5:c6:ed:d8:d2:fd:ad:a1:dd:15:37:a6:
|
||||
91:f2:c8:eb:f7:68:ee:ff:f3:d5:c7:81:a3:12:3a:
|
||||
79:2d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost.nn
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
F7:82:F9:EF:7C:0E:14:42:64:61:2C:F0:9C:36:F2:C0:B5:76:C8:1A
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
8a:4a:da:16:6e:86:84:f9:3d:8e:76:cf:e5:32:b3:aa:c1:23:
|
||||
87:e6:f7:2e:e9:f0:9f:5d:a0:88:e8:68:71:6d:52:12:53:db:
|
||||
dc:9e:8f:ac:de:95:a2:a7:d6:9e:82:ff:ef:80:49:74:4c:fa:
|
||||
3a:95:73:1d:a5:b2:93:24:3e:79:c7:47:29:04:9c:6d:e2:fa:
|
||||
98:a2:ef:10:f6:f8:00:ea:09:3b:c4:90:7f:f3:43:df:dc:6a:
|
||||
01:dd:c6:32:ae:38:bd:d1:36:c3:e6:05:c1:60:3e:7f:d9:8f:
|
||||
42:7a:f1:66:54:f8:2f:f0:a8:31:84:73:f9:26:2b:71:02:4e:
|
||||
6a:53:d6:c8:b7:5e:b0:27:40:b3:24:ee:93:76:f3:17:5d:94:
|
||||
f6:d9:3a:b7:57:ff:fa:7a:09:13:b8:7f:f4:62:e8:06:0c:1d:
|
||||
94:f0:7a:2a:af:9d:82:da:de:42:26:a2:42:cd:a0:ab:5e:ad:
|
||||
94:97:e2:7c:f5:91:f9:39:d2:3b:26:95:a3:43:b4:8c:20:ca:
|
||||
5e:7c:af:07:48:24:1f:bf:32:8e:f0:a2:85:ff:74:f1:bd:7c:
|
||||
44:63:9f:cf:91:74:b8:a8:0a:59:70:57:12:92:d7:c9:b7:ea:
|
||||
61:a3:e7:6a:5f:4c:36:3c:b8:90:c6:3a:4b:44:42:d0:82:bb:
|
||||
84:64:4a:03
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIETTCCAzWgAwIBAgIJAIE0yC2B8FQgMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFcxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
||||
DwAwggEKAoIBAQDIBAY+x3GQa+POOQQ9cFuiUPuen2jZNvCHuYJlOpoq/jfg4Jbw
|
||||
J0vA8gEzEbq6Bj1zdzSfDf3Y2h6/TWTTgNBl6LUly+nVbi5GnCoYBzZGF6LbiQgT
|
||||
9kQBgo9Fi7She4uHNmbgPgGtDCkHAj1bZ+wLLsM7xtogmV/PbfR3Enu+H8O0Jlz4
|
||||
foY5fwf4EhU2Rwsb8ALWZVy6Ga2fsEOfVElPyAyJB8R4kcA9ZIe6ozCgxxUs0al8
|
||||
yxSejFVQksyuZCff61SGoRFVdGBTW8zcnnqFm+XlLgOiIxkjmHaHsUtjE2COusXG
|
||||
7djS/a2h3RU3ppHyyOv3aO7/89XHgaMSOnktAgMBAAGjggEJMIIBBTAXBgNVHREE
|
||||
EDAOggxsb2NhbGhvc3Qubm4wCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUF
|
||||
BwMBMB0GA1UdDgQWBBT3gvnvfA4UQmRhLPCcNvLAtXbIGjAfBgNVHSMEGDAWgBSd
|
||||
K86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAz
|
||||
BggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3Qu
|
||||
Y2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRl
|
||||
bEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAikraFm6GhPk9jnbP5TKz
|
||||
qsEjh+b3Lunwn12giOhocW1SElPb3J6PrN6VoqfWnoL/74BJdEz6OpVzHaWykyQ+
|
||||
ecdHKQScbeL6mKLvEPb4AOoJO8SQf/ND39xqAd3GMq44vdE2w+YFwWA+f9mPQnrx
|
||||
ZlT4L/CoMYRz+SYrcQJOalPWyLdesCdAsyTuk3bzF12U9tk6t1f/+noJE7h/9GLo
|
||||
BgwdlPB6Kq+dgtreQiaiQs2gq16tlJfifPWR+TnSOyaVo0O0jCDKXnyvB0gkH78y
|
||||
jvCihf908b18RGOfz5F0uKgKWXBXEpLXybfqYaPnal9MNjy4kMY6S0RC0IK7hGRK
|
||||
Aw==
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,27 +0,0 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEowIBAAKCAQEAyAQGPsdxkGvjzjkEPXBbolD7np9o2Tbwh7mCZTqaKv434OCW
|
||||
8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQZei1Jcvp1W4uRpwqGAc2Rhei24kI
|
||||
E/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fsCy7DO8baIJlfz230dxJ7vh/DtCZc
|
||||
+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJT8gMiQfEeJHAPWSHuqMwoMcVLNGp
|
||||
fMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56hZvl5S4DoiMZI5h2h7FLYxNgjrrF
|
||||
xu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5LQIDAQABAoIBAQCmscvuqFO6NGCw
|
||||
Lw6ckbac6Xc69MnyNfpycyX8bcGs0SAK18KTtXxJ+qcLQ9xmSusN/ywo3wVPpEF5
|
||||
1+uO5c1JEY9fR7nC+cexa1cdnW0bL3m4E1VbJaP5yjDTmiJZbtiTQMCuZJ8K9JaA
|
||||
09oFAvBTRY7Kk+iYwJp8CrxyPEJK6T7eMMLaLkT9VkRfl3om/cbND4waf15ev7bk
|
||||
QyMGNkWbcq4EFto8+OnEifrTBv/InZu31/XzIJO1HW44sf4+/WdUehlEpR1FEfYt
|
||||
nFQvJz9w8EQPqTcuE3coQyXAgzjNnRDLXMHeLnVwydHH9Yrh+qY0YyASq6Na/gke
|
||||
FtaOPnr1AoGBAOkaMmFIVwrGPNjLysJf0/qjke86v4HN7EpeM1D98jL4EemS9Lch
|
||||
fmeUCHRtbjWcCRT6azDZa/hAe0Qe1QE+y7HdkMrDRf94aWwyRl+fvmMWeki8izv3
|
||||
3MtK6BZf5rGqt5GAwg8n9eq64SgAh88FdUJ90ULkZLO799ODtaRMKEJDAoGBANup
|
||||
zTURGY+dmFoIHBBLQT8+Hs5KoqP3fvxR2a3SytHHEaJfxGcJTaFs4mJ/fqgWm3S2
|
||||
w1c4J1OlxJjSY0UcYkqqDF6LnH3T9B4Jrwo0IJsB0BG5oJi2xZj8OEQg8Z0a3b/p
|
||||
3DXm3G2toD0MU6TUQMRtBEaWRxd1YQcMuE+5BbfPAoGAeEM/wtkjrzdfpSpfTbFL
|
||||
GIDThe11aG7pfeTj7OFX19wMwclD4Eezg5ToV8ktlxMNzHj2XJmQDuCVuCuAEcho
|
||||
Jzf8v9/HeWqSWXQGwscT3uN165j67NGQZIIdA44u43MEilk3xcIEKjqId67uYmya
|
||||
dtea4zwaiHBuB/5n9IAmNSkCgYBiwzOqeme9tKO9RwwnH07Uun9rTQ9XHX4QwFRY
|
||||
3P+n1hNNqDVMBljLDYOzuZMezBtVHJ8zZeH4r/12oJFVj296Fn69O5Q+1r9Zig0T
|
||||
T2ChkO0WKxnTz8mEAVLi/tTjSCMPmHwUGBpfjcMP76zj3TLJniJgAk0wdOwNGWD9
|
||||
Jzk07QKBgBBsK9q29qyLwOsqfTISwxZVCT+zj/7YMfxvo4RBWNq9SfWJhsGsZpXD
|
||||
DBX0My+Qrf0Vl6CV2l2zpqZxe+nGSeCDelJZaqYjhoRAynnawOZ3fNBmBNt7U6jX
|
||||
dze4yPef6lUpeVaxPgwCgePUAlvgScV7fqlv4jClGlrwk9DH1YcG
|
||||
-----END RSA PRIVATE KEY-----
|
||||
@ -1,166 +0,0 @@
|
||||
extensions = x509v3
|
||||
|
||||
[ x509v3 ]
|
||||
subjectAltName = DNS:localhost.nn
|
||||
keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
||||
extendedKeyUsage = serverAuth
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid
|
||||
basicConstraints = CA:false
|
||||
authorityInfoAccess = @issuer_info
|
||||
crlDistributionPoints = @crl_info
|
||||
|
||||
[ crl_ext ]
|
||||
authorityKeyIdentifier = keyid:always
|
||||
authorityInfoAccess = @issuer_info
|
||||
|
||||
[ issuer_info ]
|
||||
caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
[ crl_info ]
|
||||
URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
[ req ]
|
||||
default_bits = 1024
|
||||
distinguished_name = req_DN
|
||||
default_md = sha256
|
||||
string_mask = utf8only
|
||||
|
||||
[ req_DN ]
|
||||
countryName = "Country Name is Northern Nowhere"
|
||||
countryName_value = NN
|
||||
organizationName = "Organization Name"
|
||||
organizationName_value = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = "Common Name"
|
||||
commonName_value = localhost.nn
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEowIBAAKCAQEAyAQGPsdxkGvjzjkEPXBbolD7np9o2Tbwh7mCZTqaKv434OCW
|
||||
8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQZei1Jcvp1W4uRpwqGAc2Rhei24kI
|
||||
E/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fsCy7DO8baIJlfz230dxJ7vh/DtCZc
|
||||
+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJT8gMiQfEeJHAPWSHuqMwoMcVLNGp
|
||||
fMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56hZvl5S4DoiMZI5h2h7FLYxNgjrrF
|
||||
xu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5LQIDAQABAoIBAQCmscvuqFO6NGCw
|
||||
Lw6ckbac6Xc69MnyNfpycyX8bcGs0SAK18KTtXxJ+qcLQ9xmSusN/ywo3wVPpEF5
|
||||
1+uO5c1JEY9fR7nC+cexa1cdnW0bL3m4E1VbJaP5yjDTmiJZbtiTQMCuZJ8K9JaA
|
||||
09oFAvBTRY7Kk+iYwJp8CrxyPEJK6T7eMMLaLkT9VkRfl3om/cbND4waf15ev7bk
|
||||
QyMGNkWbcq4EFto8+OnEifrTBv/InZu31/XzIJO1HW44sf4+/WdUehlEpR1FEfYt
|
||||
nFQvJz9w8EQPqTcuE3coQyXAgzjNnRDLXMHeLnVwydHH9Yrh+qY0YyASq6Na/gke
|
||||
FtaOPnr1AoGBAOkaMmFIVwrGPNjLysJf0/qjke86v4HN7EpeM1D98jL4EemS9Lch
|
||||
fmeUCHRtbjWcCRT6azDZa/hAe0Qe1QE+y7HdkMrDRf94aWwyRl+fvmMWeki8izv3
|
||||
3MtK6BZf5rGqt5GAwg8n9eq64SgAh88FdUJ90ULkZLO799ODtaRMKEJDAoGBANup
|
||||
zTURGY+dmFoIHBBLQT8+Hs5KoqP3fvxR2a3SytHHEaJfxGcJTaFs4mJ/fqgWm3S2
|
||||
w1c4J1OlxJjSY0UcYkqqDF6LnH3T9B4Jrwo0IJsB0BG5oJi2xZj8OEQg8Z0a3b/p
|
||||
3DXm3G2toD0MU6TUQMRtBEaWRxd1YQcMuE+5BbfPAoGAeEM/wtkjrzdfpSpfTbFL
|
||||
GIDThe11aG7pfeTj7OFX19wMwclD4Eezg5ToV8ktlxMNzHj2XJmQDuCVuCuAEcho
|
||||
Jzf8v9/HeWqSWXQGwscT3uN165j67NGQZIIdA44u43MEilk3xcIEKjqId67uYmya
|
||||
dtea4zwaiHBuB/5n9IAmNSkCgYBiwzOqeme9tKO9RwwnH07Uun9rTQ9XHX4QwFRY
|
||||
3P+n1hNNqDVMBljLDYOzuZMezBtVHJ8zZeH4r/12oJFVj296Fn69O5Q+1r9Zig0T
|
||||
T2ChkO0WKxnTz8mEAVLi/tTjSCMPmHwUGBpfjcMP76zj3TLJniJgAk0wdOwNGWD9
|
||||
Jzk07QKBgBBsK9q29qyLwOsqfTISwxZVCT+zj/7YMfxvo4RBWNq9SfWJhsGsZpXD
|
||||
DBX0My+Qrf0Vl6CV2l2zpqZxe+nGSeCDelJZaqYjhoRAynnawOZ3fNBmBNt7U6jX
|
||||
dze4yPef6lUpeVaxPgwCgePUAlvgScV7fqlv4jClGlrwk9DH1YcG
|
||||
-----END RSA PRIVATE KEY-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:20
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:47 2025 GMT
|
||||
Not After : Dec 31 11:51:47 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost.nn
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:c8:04:06:3e:c7:71:90:6b:e3:ce:39:04:3d:70:
|
||||
5b:a2:50:fb:9e:9f:68:d9:36:f0:87:b9:82:65:3a:
|
||||
9a:2a:fe:37:e0:e0:96:f0:27:4b:c0:f2:01:33:11:
|
||||
ba:ba:06:3d:73:77:34:9f:0d:fd:d8:da:1e:bf:4d:
|
||||
64:d3:80:d0:65:e8:b5:25:cb:e9:d5:6e:2e:46:9c:
|
||||
2a:18:07:36:46:17:a2:db:89:08:13:f6:44:01:82:
|
||||
8f:45:8b:b4:a1:7b:8b:87:36:66:e0:3e:01:ad:0c:
|
||||
29:07:02:3d:5b:67:ec:0b:2e:c3:3b:c6:da:20:99:
|
||||
5f:cf:6d:f4:77:12:7b:be:1f:c3:b4:26:5c:f8:7e:
|
||||
86:39:7f:07:f8:12:15:36:47:0b:1b:f0:02:d6:65:
|
||||
5c:ba:19:ad:9f:b0:43:9f:54:49:4f:c8:0c:89:07:
|
||||
c4:78:91:c0:3d:64:87:ba:a3:30:a0:c7:15:2c:d1:
|
||||
a9:7c:cb:14:9e:8c:55:50:92:cc:ae:64:27:df:eb:
|
||||
54:86:a1:11:55:74:60:53:5b:cc:dc:9e:7a:85:9b:
|
||||
e5:e5:2e:03:a2:23:19:23:98:76:87:b1:4b:63:13:
|
||||
60:8e:ba:c5:c6:ed:d8:d2:fd:ad:a1:dd:15:37:a6:
|
||||
91:f2:c8:eb:f7:68:ee:ff:f3:d5:c7:81:a3:12:3a:
|
||||
79:2d
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost.nn
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
F7:82:F9:EF:7C:0E:14:42:64:61:2C:F0:9C:36:F2:C0:B5:76:C8:1A
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
8a:4a:da:16:6e:86:84:f9:3d:8e:76:cf:e5:32:b3:aa:c1:23:
|
||||
87:e6:f7:2e:e9:f0:9f:5d:a0:88:e8:68:71:6d:52:12:53:db:
|
||||
dc:9e:8f:ac:de:95:a2:a7:d6:9e:82:ff:ef:80:49:74:4c:fa:
|
||||
3a:95:73:1d:a5:b2:93:24:3e:79:c7:47:29:04:9c:6d:e2:fa:
|
||||
98:a2:ef:10:f6:f8:00:ea:09:3b:c4:90:7f:f3:43:df:dc:6a:
|
||||
01:dd:c6:32:ae:38:bd:d1:36:c3:e6:05:c1:60:3e:7f:d9:8f:
|
||||
42:7a:f1:66:54:f8:2f:f0:a8:31:84:73:f9:26:2b:71:02:4e:
|
||||
6a:53:d6:c8:b7:5e:b0:27:40:b3:24:ee:93:76:f3:17:5d:94:
|
||||
f6:d9:3a:b7:57:ff:fa:7a:09:13:b8:7f:f4:62:e8:06:0c:1d:
|
||||
94:f0:7a:2a:af:9d:82:da:de:42:26:a2:42:cd:a0:ab:5e:ad:
|
||||
94:97:e2:7c:f5:91:f9:39:d2:3b:26:95:a3:43:b4:8c:20:ca:
|
||||
5e:7c:af:07:48:24:1f:bf:32:8e:f0:a2:85:ff:74:f1:bd:7c:
|
||||
44:63:9f:cf:91:74:b8:a8:0a:59:70:57:12:92:d7:c9:b7:ea:
|
||||
61:a3:e7:6a:5f:4c:36:3c:b8:90:c6:3a:4b:44:42:d0:82:bb:
|
||||
84:64:4a:03
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIETTCCAzWgAwIBAgIJAIE0yC2B8FQgMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFcxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
|
||||
DwAwggEKAoIBAQDIBAY+x3GQa+POOQQ9cFuiUPuen2jZNvCHuYJlOpoq/jfg4Jbw
|
||||
J0vA8gEzEbq6Bj1zdzSfDf3Y2h6/TWTTgNBl6LUly+nVbi5GnCoYBzZGF6LbiQgT
|
||||
9kQBgo9Fi7She4uHNmbgPgGtDCkHAj1bZ+wLLsM7xtogmV/PbfR3Enu+H8O0Jlz4
|
||||
foY5fwf4EhU2Rwsb8ALWZVy6Ga2fsEOfVElPyAyJB8R4kcA9ZIe6ozCgxxUs0al8
|
||||
yxSejFVQksyuZCff61SGoRFVdGBTW8zcnnqFm+XlLgOiIxkjmHaHsUtjE2COusXG
|
||||
7djS/a2h3RU3ppHyyOv3aO7/89XHgaMSOnktAgMBAAGjggEJMIIBBTAXBgNVHREE
|
||||
EDAOggxsb2NhbGhvc3Qubm4wCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUF
|
||||
BwMBMB0GA1UdDgQWBBT3gvnvfA4UQmRhLPCcNvLAtXbIGjAfBgNVHSMEGDAWgBSd
|
||||
K86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAz
|
||||
BggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3Qu
|
||||
Y2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRl
|
||||
bEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAikraFm6GhPk9jnbP5TKz
|
||||
qsEjh+b3Lunwn12giOhocW1SElPb3J6PrN6VoqfWnoL/74BJdEz6OpVzHaWykyQ+
|
||||
ecdHKQScbeL6mKLvEPb4AOoJO8SQf/ND39xqAd3GMq44vdE2w+YFwWA+f9mPQnrx
|
||||
ZlT4L/CoMYRz+SYrcQJOalPWyLdesCdAsyTuk3bzF12U9tk6t1f/+noJE7h/9GLo
|
||||
BgwdlPB6Kq+dgtreQiaiQs2gq16tlJfifPWR+TnSOyaVo0O0jCDKXnyvB0gkH78y
|
||||
jvCihf908b18RGOfz5F0uKgKWXBXEpLXybfqYaPnal9MNjy4kMY6S0RC0IK7hGRK
|
||||
Aw==
|
||||
-----END CERTIFICATE-----
|
||||
Binary file not shown.
@ -1,9 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyAQGPsdxkGvjzjkEPXBb
|
||||
olD7np9o2Tbwh7mCZTqaKv434OCW8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQ
|
||||
Zei1Jcvp1W4uRpwqGAc2Rhei24kIE/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fs
|
||||
Cy7DO8baIJlfz230dxJ7vh/DtCZc+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJ
|
||||
T8gMiQfEeJHAPWSHuqMwoMcVLNGpfMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56
|
||||
hZvl5S4DoiMZI5h2h7FLYxNgjrrFxu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5
|
||||
LQIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
@ -1,165 +0,0 @@
|
||||
extensions = x509v3
|
||||
|
||||
[ x509v3 ]
|
||||
subjectAltName = DNS:localhost
|
||||
keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
||||
extendedKeyUsage = serverAuth
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid
|
||||
basicConstraints = CA:false
|
||||
authorityInfoAccess = @issuer_info
|
||||
crlDistributionPoints = @crl_info
|
||||
|
||||
[ crl_ext ]
|
||||
authorityKeyIdentifier = keyid:always
|
||||
authorityInfoAccess = @issuer_info
|
||||
|
||||
[ issuer_info ]
|
||||
caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
[ crl_info ]
|
||||
URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
[ req ]
|
||||
default_bits = 2048
|
||||
distinguished_name = req_DN
|
||||
default_md = sha256
|
||||
string_mask = utf8only
|
||||
|
||||
[ req_DN ]
|
||||
countryName = "Country Name is Northern Nowhere"
|
||||
countryName_value = NN
|
||||
organizationName = "Organization Name"
|
||||
organizationName_value = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = "Common Name"
|
||||
commonName_value = localhost
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEpAIBAAKCAQEA5g2vWV5TVz9OweL4zzBl3WITMUYL0GCAUQ0JM43hsg8K8vwQ
|
||||
C+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg4CTH+twM44Nsi9H9Kqij0yH/xTxH
|
||||
GgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1XHyFg37R8CC8z/XbMI8jtHPu7inQu
|
||||
/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHRFCG/0bCZUHpqEAww1fDkGsddG+m+
|
||||
vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXRki0izhrKwjX9fPYCR4UijF1uTylr
|
||||
OvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4sQIDAQABAoIBAQCorDH7sWgjmRwy
|
||||
lirdJlwZlFYEE5qH3qlWQ9uSPB3VwqfBfkR5oVqFYZUcRoInrJ3MOJS30gorGx4t
|
||||
mJ5hqmXZ0b36VSryCSMl5QHdLCZpoAz63PY4xjPj6gIY3DS2ybV18wFQqfweQISV
|
||||
xWQKIgYVohB4FMm36nwRA/Aq8J/BVgC/SIGJnDW2EGId5op20BdH7APedquXqzzp
|
||||
FwETV3hH7QDbdip+Td+5/Nnc9yLg4ecSvOLe5mLaGXgsxhNqAKnY5f3izMh+FTvx
|
||||
jgR12x/urhu4mwpKie7Y/JO+FsNJYevHHKYX1wUhGO2Puco4bCUiAecmrO4lFOMX
|
||||
auBjsCQtAoGBAPcnzQy8UIHBSxgUaQ2zEWtQNKg/lYy3BiM7rTq8HIAEggL5ylxv
|
||||
bP17tIQQZAhayaeR1BKL7yP8d5UlZedI9gzMP23mNsrxpC2BsmcBEZZQFRRFhWsD
|
||||
bnVWWQkx6KgVIDtZwQF1OhNUuZxUkTlXMSuSdNNVJADIHd8y7oxaGGvHAoGBAO5J
|
||||
Nj3L7eh9Eoh4iEMbyOu1iymE+jdzuY80wVBacMinjpmGE6wlIf/bvwb2/xGMd+Ix
|
||||
Sd60wCg/obN/62EAWaiJH88qrF5Uj+l2u1tmp3oRMOiBkXbLhEXzGP9Qcoa6s8gT
|
||||
HjatboUgCUuSQrY4OUu+wmqwufBh7poSGFUs/YfHAoGBAL5svgG3/ddbVD5jS2Ww
|
||||
uBUUoN2Yz+KxCVuQGTINyW+hCYK9bnq1pyXOcBDoiAof2QrwwpLfmgsB9CjHvbHr
|
||||
dxf5Lk3AeCr47uPY79mI60ICxZruzZLb+/kP5F2/RGBsln7j8l7rMSm/t5qJVbL2
|
||||
SP4nQzeoe6rWhJ15om4k5Hf1AoGAGpuGOQRKfoloxmBfJs81ckyFS4+TuRltAPat
|
||||
F2Hh8iXzoGT+UVycHUvWWtq9xKHgyRsj2oBobJYeYkLIb75wRId7S9DCCo56u2EM
|
||||
rroZvWGqCmxdZ9x12rG4etnqz+yNIqwv1X8sNiVLpGqilGJW04RrhSpSuOrWj9Gx
|
||||
ceFiNgUCgYBAAubXkD1rcIs2X8Ds3ztwYPaGL8ZX4q8eWvncgjz3YmVve408XD0w
|
||||
Sd44NWgjK2LXMv3ddXFdukoDmGm75KhDHWKO9vPBo0wpB5FXkMyHiDyM65X0MZC8
|
||||
xzSd9dUcy7TBjMVV2ge81b6U8nCwrdrU2L/0dzigmKnrLrF8MRjFLA==
|
||||
-----END RSA PRIVATE KEY-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:1f
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:47 2025 GMT
|
||||
Not After : Dec 31 11:51:47 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:e6:0d:af:59:5e:53:57:3f:4e:c1:e2:f8:cf:30:
|
||||
65:dd:62:13:31:46:0b:d0:60:80:51:0d:09:33:8d:
|
||||
e1:b2:0f:0a:f2:fc:10:0b:e1:3a:69:43:c3:e9:eb:
|
||||
8b:45:8b:d5:26:0e:bd:c8:d4:a6:0f:1b:00:8d:74:
|
||||
36:60:30:a0:e0:24:c7:fa:dc:0c:e3:83:6c:8b:d1:
|
||||
fd:2a:a8:a3:d3:21:ff:c5:3c:47:1a:09:e1:8c:32:
|
||||
79:74:49:e9:f2:df:f7:4d:ac:b4:07:ec:81:40:27:
|
||||
65:b3:94:69:76:cd:57:1f:21:60:df:b4:7c:08:2f:
|
||||
33:fd:76:cc:23:c8:ed:1c:fb:bb:8a:74:2e:fe:7c:
|
||||
1d:d3:2f:22:2d:ff:11:7d:92:50:cc:c0:06:ac:95:
|
||||
a8:b3:06:42:83:09:1c:52:81:d1:14:21:bf:d1:b0:
|
||||
99:50:7a:6a:10:0c:30:d5:f0:e4:1a:c7:5d:1b:e9:
|
||||
be:be:c5:54:eb:e4:72:04:35:c4:14:a1:ba:20:45:
|
||||
2f:60:c8:e1:a1:de:b5:65:f7:2a:5d:05:d1:92:2d:
|
||||
22:ce:1a:ca:c2:35:fd:7c:f6:02:47:85:22:8c:5d:
|
||||
6e:4f:29:6b:3a:f9:84:73:89:4a:64:7b:9f:bd:fe:
|
||||
0a:4d:a0:08:7a:41:77:a3:dd:ba:c9:20:58:a1:7c:
|
||||
b8:b1
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
B4:23:96:D3:28:32:87:90:18:46:E5:2D:CD:D3:DB:4F:9B:92:76:79
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
43:b8:3e:47:2e:1c:8e:76:16:4d:c5:04:89:c9:d3:42:5c:af:
|
||||
97:27:da:6a:7f:bb:6d:49:51:0c:60:c7:0b:ce:8f:a3:33:26:
|
||||
ae:f8:75:fa:c8:43:65:b7:c1:a4:eb:bb:9b:50:e4:97:8f:78:
|
||||
b0:a7:00:95:5e:ac:3d:39:96:a6:39:a6:96:ad:5c:1b:e0:d3:
|
||||
81:91:25:f1:1c:bd:dd:70:d5:8d:44:03:6e:8c:93:66:98:fd:
|
||||
1d:66:b8:58:6a:90:11:26:44:3b:4e:8a:c4:ef:f7:4c:f4:57:
|
||||
ba:75:f5:dd:24:43:82:29:12:e8:4e:fc:9e:6f:a8:8e:e7:01:
|
||||
ff:56:e4:2d:62:02:99:a1:a9:fa:45:46:48:58:17:e8:ee:37:
|
||||
31:39:08:b6:a3:55:7e:6a:c5:3e:c0:1c:03:39:bc:64:d8:8d:
|
||||
7e:57:35:71:14:38:77:64:3a:3f:b4:4b:e8:10:31:a1:08:8c:
|
||||
2f:e8:de:d4:f8:a0:e6:07:3b:12:8e:12:83:eb:e3:ba:7c:91:
|
||||
b3:50:5e:f3:df:6d:3f:c1:70:f3:5c:e5:0c:84:1a:9d:5a:ae:
|
||||
bc:ac:53:f2:b6:e5:66:f8:00:c0:74:af:ed:e2:89:36:a6:c2:
|
||||
8b:90:8d:6c:23:a3:60:2e:49:1d:dd:d2:19:45:cb:cf:a4:c3:
|
||||
87:9c:fb:8f
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIERzCCAy+gAwIBAgIJAIE0yC2B8FQfMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFQxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQDmDa9ZXlNXP07B4vjPMGXdYhMxRgvQYIBRDQkzjeGyDwry/BAL4Tpp
|
||||
Q8Pp64tFi9UmDr3I1KYPGwCNdDZgMKDgJMf63Azjg2yL0f0qqKPTIf/FPEcaCeGM
|
||||
Mnl0Seny3/dNrLQH7IFAJ2WzlGl2zVcfIWDftHwILzP9dswjyO0c+7uKdC7+fB3T
|
||||
LyIt/xF9klDMwAaslaizBkKDCRxSgdEUIb/RsJlQemoQDDDV8OQax10b6b6+xVTr
|
||||
5HIENcQUobogRS9gyOGh3rVl9ypdBdGSLSLOGsrCNf189gJHhSKMXW5PKWs6+YRz
|
||||
iUpke5+9/gpNoAh6QXej3brJIFihfLixAgMBAAGjggEGMIIBAjAUBgNVHREEDTAL
|
||||
gglsb2NhbGhvc3QwCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0G
|
||||
A1UdDgQWBBS0I5bTKDKHkBhG5S3N09tPm5J2eTAfBgNVHSMEGDAWgBSdK86Vv9gi
|
||||
kaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEF
|
||||
BQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgG
|
||||
A1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxS
|
||||
b290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAQ7g+Ry4cjnYWTcUEicnTQlyvlyfa
|
||||
an+7bUlRDGDHC86PozMmrvh1+shDZbfBpOu7m1Dkl494sKcAlV6sPTmWpjmmlq1c
|
||||
G+DTgZEl8Ry93XDVjUQDboyTZpj9HWa4WGqQESZEO06KxO/3TPRXunX13SRDgikS
|
||||
6E78nm+ojucB/1bkLWICmaGp+kVGSFgX6O43MTkItqNVfmrFPsAcAzm8ZNiNflc1
|
||||
cRQ4d2Q6P7RL6BAxoQiML+je1Pig5gc7Eo4Sg+vjunyRs1Be899tP8Fw81zlDIQa
|
||||
nVquvKxT8rblZvgAwHSv7eKJNqbCi5CNbCOjYC5JHd3SGUXLz6TDh5z7jw==
|
||||
-----END CERTIFICATE-----
|
||||
Binary file not shown.
@ -1,9 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5g2vWV5TVz9OweL4zzBl
|
||||
3WITMUYL0GCAUQ0JM43hsg8K8vwQC+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg
|
||||
4CTH+twM44Nsi9H9Kqij0yH/xTxHGgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1X
|
||||
HyFg37R8CC8z/XbMI8jtHPu7inQu/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHR
|
||||
FCG/0bCZUHpqEAww1fDkGsddG+m+vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXR
|
||||
ki0izhrKwjX9fPYCR4UijF1uTylrOvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4
|
||||
sQIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
@ -1,37 +0,0 @@
|
||||
-----BEGIN X509 CRL-----
|
||||
MIIGejCCBWICAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
|
||||
BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
|
||||
BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
|
||||
NDhaFw0yNTA0MDUxMTUxNDhaMIIEtDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
|
||||
NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
|
||||
MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
|
||||
8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
|
||||
AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
|
||||
MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
|
||||
DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
|
||||
NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
|
||||
OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
|
||||
MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
|
||||
8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
|
||||
AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
|
||||
MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
|
||||
DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
|
||||
NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
|
||||
OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
|
||||
MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
|
||||
8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
|
||||
AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
|
||||
MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
|
||||
DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
|
||||
NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
|
||||
NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
|
||||
MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
|
||||
8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa
|
||||
AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFqgDjAMMAoGA1UdFAQDAgEBMA0GCSqG
|
||||
SIb3DQEBCwUAA4IBAQBZnXmwUUp0FcVGHfHWsf6rip/4cn5FYso0v4kXSI4icqZ7
|
||||
tncP3i6smiDzWqFSNp0TyKzeVvVPAwsafO6TPjUmUZXZrrU64QhJY44AEQbvl1cm
|
||||
4QA+JN0RhIxr85e6X4O7VElMz0fV8T8l01izj1+SbAl4W6z3xoZNErskn9LtWY5X
|
||||
HvDlgl1hZZc8bw3qZMHQJdvvJ2FHlh7j7ugBVdMZKdO0hoFCjoEMgeVSot7Hjtv1
|
||||
R0JYnTFxcuMJ/MVQmxUTdWaLnMqT9RPjzMhLRzOc2WupDvPLla63qvwBxoNWL0Cr
|
||||
hkz9i899thHhosi3i+fgQ3Ynf53VoU3jXces2wqU
|
||||
-----END X509 CRL-----
|
||||
@ -1,103 +0,0 @@
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:21
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:48 2025 GMT
|
||||
Not After : Dec 31 11:51:48 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:bd:d7:58:68:62:0c:68:34:df:a2:1d:d9:34:fc:
|
||||
f1:45:bf:cc:e3:57:38:e6:d3:07:fc:65:e1:b3:28:
|
||||
ad:d6:2c:3b:2e:a9:6a:b9:07:e7:66:1f:b8:a0:c2:
|
||||
75:1d:31:84:3e:5d:98:d3:37:bb:a0:96:97:7f:f7:
|
||||
17:5e:89:ad:6e:bf:8c:0d:ef:c2:7c:f5:3b:76:0a:
|
||||
84:30:ef:bf:2f:c0:8a:a6:50:33:e1:a4:00:bd:0c:
|
||||
0c:79:04:09:d1:45:09:fe:b2:4b:a3:cf:1e:3b:65:
|
||||
b4:5a:a5:a4:86:e0:d6:95:c0:a9:d7:58:ec:8e:4e:
|
||||
72:3f:33:77:f3:3d:b5:6d:63:28:85:8a:49:e5:20:
|
||||
ef:56:9a:ad:f3:9d:e2:b6:ca:66:dd:06:e2:cc:09:
|
||||
86:36:c2:d0:1f:3e:33:bc:bc:c5:23:f7:2a:4c:f0:
|
||||
5b:4f:3c:60:f4:33:f3:dd:c8:ad:83:d2:45:9f:6d:
|
||||
0d:cb:b6:29:94:b8:df:3b:c3:73:7e:95:ef:e6:68:
|
||||
e7:c6:22:79:4a:69:7c:85:4a:88:9d:9a:90:71:42:
|
||||
79:73:3e:b2:ed:e2:0c:4e:53:85:5a:de:e7:85:37:
|
||||
6f:0e:21:e1:f1:f0:1d:09:ec:0f:fd:69:5f:d9:74:
|
||||
71:35:4d:02:73:f3:2d:3e:9c:58:f5:48:d6:63:b4:
|
||||
fb:85
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
F7:A5:D0:5C:C7:C2:37:AA:5D:7A:76:0B:17:61:70:C9:5D:B9:C9:55
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
28:61:05:e4:55:30:48:40:12:df:f6:fb:64:5e:10:6d:5c:48:
|
||||
d2:ef:b2:c2:27:28:f0:a1:88:5a:c8:ae:cb:87:12:60:04:aa:
|
||||
e0:1e:4c:c3:4c:8e:d5:8a:f8:8c:c8:3f:e5:d7:06:8a:3d:40:
|
||||
c0:ea:03:dd:9c:d6:f5:68:67:71:51:4f:8d:80:1f:d3:53:09:
|
||||
5b:78:be:dc:6d:98:68:c0:38:d2:10:ad:56:95:9c:b7:56:e2:
|
||||
ec:98:b7:6f:3c:f4:b5:1e:94:7b:3d:e2:f7:a4:89:b5:89:61:
|
||||
29:45:ea:05:8d:23:a3:ad:b6:ef:97:21:91:ce:f2:7d:12:3a:
|
||||
e3:fc:e0:eb:85:18:eb:af:b7:51:81:2b:a2:60:01:60:d9:31:
|
||||
96:cb:9c:e3:b9:29:38:f7:51:7d:40:bf:87:6e:42:fa:74:c0:
|
||||
9b:cb:1a:95:63:30:a7:41:b4:65:e3:cc:87:2c:01:d9:00:d8:
|
||||
e3:62:ab:d2:64:37:43:c2:16:36:0f:ae:a6:79:00:d6:37:37:
|
||||
ff:31:6a:77:15:cc:ff:1b:52:33:9b:04:8e:f5:5b:a6:52:60:
|
||||
e8:1c:b8:3e:df:b9:d5:67:ba:3d:23:d6:5a:07:cd:e8:e2:01:
|
||||
0f:57:ea:b0:fb:27:a4:2a:1b:f0:16:01:90:cc:9e:32:13:cc:
|
||||
f1:bf:cb:80
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIESTCCAzGgAwIBAgIJAIE0yC2B8FQhMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFQxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQC911hoYgxoNN+iHdk0/PFFv8zjVzjm0wf8ZeGzKK3WLDsuqWq5B+dm
|
||||
H7igwnUdMYQ+XZjTN7uglpd/9xdeia1uv4wN78J89Tt2CoQw778vwIqmUDPhpAC9
|
||||
DAx5BAnRRQn+skujzx47ZbRapaSG4NaVwKnXWOyOTnI/M3fzPbVtYyiFiknlIO9W
|
||||
mq3zneK2ymbdBuLMCYY2wtAfPjO8vMUj9ypM8FtPPGD0M/PdyK2D0kWfbQ3LtimU
|
||||
uN87w3N+le/maOfGInlKaXyFSoidmpBxQnlzPrLt4gxOU4Va3ueFN28OIeHx8B0J
|
||||
7A/9aV/ZdHE1TQJz8y0+nFj1SNZjtPuFAgMBAAGjggEIMIIBBDAWBgNVHREEDzAN
|
||||
ggtsb2NhbGhvc3QAaDALBgNVHQ8EBAMCA6gwEwYDVR0lBAwwCgYIKwYBBQUHAwEw
|
||||
HQYDVR0OBBYEFPel0FzHwjeqXXp2CxdhcMlduclVMB8GA1UdIwQYMBaAFJ0rzpW/
|
||||
2CKRouWt/nkO6SPhTSgyMAkGA1UdEwQCMAAwQwYIKwYBBQUHAQEENzA1MDMGCCsG
|
||||
AQUFBzAChidodHRwOi8vdGVzdC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIw
|
||||
OAYDVR0fBDEwLzAtoCugKYYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3Vy
|
||||
bFJvb3QuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQAoYQXkVTBIQBLf9vtkXhBtXEjS
|
||||
77LCJyjwoYhayK7LhxJgBKrgHkzDTI7ViviMyD/l1waKPUDA6gPdnNb1aGdxUU+N
|
||||
gB/TUwlbeL7cbZhowDjSEK1WlZy3VuLsmLdvPPS1HpR7PeL3pIm1iWEpReoFjSOj
|
||||
rbbvlyGRzvJ9Ejrj/ODrhRjrr7dRgSuiYAFg2TGWy5zjuSk491F9QL+HbkL6dMCb
|
||||
yxqVYzCnQbRl48yHLAHZANjjYqvSZDdDwhY2D66meQDWNzf/MWp3Fcz/G1IzmwSO
|
||||
9VumUmDoHLg+37nVZ7o9I9ZaB83o4gEPV+qw+yekKhvwFgGQzJ4yE8zxv8uA
|
||||
-----END CERTIFICATE-----
|
||||
@ -1,27 +0,0 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEpgIBAAKCAQEAvddYaGIMaDTfoh3ZNPzxRb/M41c45tMH/GXhsyit1iw7Lqlq
|
||||
uQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomtbr+MDe/CfPU7dgqEMO+/L8CKplAz
|
||||
4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDWlcCp11jsjk5yPzN38z21bWMohYpJ
|
||||
5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzFI/cqTPBbTzxg9DPz3citg9JFn20N
|
||||
y7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQcUJ5cz6y7eIMTlOFWt7nhTdvDiHh
|
||||
8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7hQIDAQABAoIBAQCB1IhtusBpc9+N
|
||||
a4RkrKgE34sr3zbXBXPstXCJqkRYuJ8w5kRKjpE+Umtd5h9Z+8dJL5GYwgDbbqHl
|
||||
rgKZcObfWrhZv6Lu+nfT3pVRMmU6Lx+jZi5VHmgy4c6V5KEiMWkIer8oJDm0vXV+
|
||||
mNHQPGwEtmJxGCuPly6i8nwSKh2t1HfRM9yC5bARj/zQq3W+iAkPIUKynHvRvB5+
|
||||
ZVClyTYlXLByRu9VvRlDxP5wc1zjHVdfQTG5lSgV0dZGtyT9MdqI9fidnkuxmsDu
|
||||
P9WxcmvUPbdM4Uzddb58u80UEzh86HDZo8juCO6JMy2zG1K7vWbh5RIwB/9IW764
|
||||
yCnfuEMBAoGBAPGYTd/IQgWEFZZyffOHBJbOffATSn1M4uATk2Xd82facDIgyKJz
|
||||
CkUZjxuR5W/znpnFmwMq5FabI504SEp4zYZU9iFKoofYdcsv8/XNWz2dFhuEfReI
|
||||
T2pNbRieJFM0+bBOq/bJGlmrRsfqHrmtN+p59VUoE+9XwfPGwr0G5j+xAoGBAMkp
|
||||
EvAAwab/0zb71YfoNLbQz+Z5965tUEZY0opc2GvB6heMF8+54I0IapKVCITglmbN
|
||||
0pWRRGo0Zyb1rGWoDGgLT6CyJ+gIYpPJWb/iFxUyBQzJzzDkMtAj43eXGSO+7eho
|
||||
qVUXJA5uvjDlP8lLPSyDY/2wP8BPYigzQm8hcGIVAoGBANjVXW9wCPFybv2snKap
|
||||
k9DWW+nRJpX3H9kFONHAtumLAA+9pNVIcvs5yVtxQn+MI9jXphzdrjqc2wYMsbVF
|
||||
XxElyBJxLhbGjFJlI4yFV1KhXmosKymnyb8a5sOli+yyKze2JFlGfUPlmY1r70+u
|
||||
y/TCqRJY+itilEz7I2UMgDLBAoGBALcIT3nfRlTca2OZKwZZSzWYs8JC8hFc13Da
|
||||
ut84cZdCvuwkBTp2J5JLuSScxD6bV149IsIChpyYB8+UNAPfL0KwIAjYcaUXlBJi
|
||||
X+5PGq+nbp7fNU2IJY/rR7p12mMDA9e2+3Q39Q/IxfcZcLuIYSYSezXGW4tw76Ai
|
||||
W+1gILCtAoGBAK5f4pSOG6hSYLqn1f0yqpIiTfeA2FJTUSB1eVkO7Y+YNnYpmFok
|
||||
1FlsFSlFYi8xqgWqwacs8H2uNnWpYKTpeCYLcWWO3KklddhB54f1+5tpOv0pVgji
|
||||
Lczo5hccgURjwx1ebbH8h4rYTBskb9xagw7n28O6BXaGJvx4fjdDwirL
|
||||
-----END RSA PRIVATE KEY-----
|
||||
@ -1,166 +0,0 @@
|
||||
extensions = x509v3
|
||||
|
||||
[ x509v3 ]
|
||||
#subjectAltName = DNS:localhost\0h
|
||||
subjectAltName = DER:30:0d:82:0b:6c:6f:63:61:6c:68:6f:73:74:00:68
|
||||
keyUsage = keyEncipherment,digitalSignature,keyAgreement
|
||||
extendedKeyUsage = serverAuth
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid
|
||||
basicConstraints = CA:false
|
||||
authorityInfoAccess = @issuer_info
|
||||
crlDistributionPoints = @crl_info
|
||||
|
||||
[ crl_ext ]
|
||||
authorityKeyIdentifier = keyid:always
|
||||
authorityInfoAccess = @issuer_info
|
||||
|
||||
[ issuer_info ]
|
||||
caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
[ crl_info ]
|
||||
URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
[ req ]
|
||||
default_bits = 1024
|
||||
distinguished_name = req_DN
|
||||
default_md = sha256
|
||||
string_mask = utf8only
|
||||
|
||||
[ req_DN ]
|
||||
countryName = "Country Name is Northern Nowhere"
|
||||
countryName_value = NN
|
||||
organizationName = "Organization Name"
|
||||
organizationName_value = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = "Common Name"
|
||||
commonName_value = localhost
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEpgIBAAKCAQEAvddYaGIMaDTfoh3ZNPzxRb/M41c45tMH/GXhsyit1iw7Lqlq
|
||||
uQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomtbr+MDe/CfPU7dgqEMO+/L8CKplAz
|
||||
4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDWlcCp11jsjk5yPzN38z21bWMohYpJ
|
||||
5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzFI/cqTPBbTzxg9DPz3citg9JFn20N
|
||||
y7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQcUJ5cz6y7eIMTlOFWt7nhTdvDiHh
|
||||
8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7hQIDAQABAoIBAQCB1IhtusBpc9+N
|
||||
a4RkrKgE34sr3zbXBXPstXCJqkRYuJ8w5kRKjpE+Umtd5h9Z+8dJL5GYwgDbbqHl
|
||||
rgKZcObfWrhZv6Lu+nfT3pVRMmU6Lx+jZi5VHmgy4c6V5KEiMWkIer8oJDm0vXV+
|
||||
mNHQPGwEtmJxGCuPly6i8nwSKh2t1HfRM9yC5bARj/zQq3W+iAkPIUKynHvRvB5+
|
||||
ZVClyTYlXLByRu9VvRlDxP5wc1zjHVdfQTG5lSgV0dZGtyT9MdqI9fidnkuxmsDu
|
||||
P9WxcmvUPbdM4Uzddb58u80UEzh86HDZo8juCO6JMy2zG1K7vWbh5RIwB/9IW764
|
||||
yCnfuEMBAoGBAPGYTd/IQgWEFZZyffOHBJbOffATSn1M4uATk2Xd82facDIgyKJz
|
||||
CkUZjxuR5W/znpnFmwMq5FabI504SEp4zYZU9iFKoofYdcsv8/XNWz2dFhuEfReI
|
||||
T2pNbRieJFM0+bBOq/bJGlmrRsfqHrmtN+p59VUoE+9XwfPGwr0G5j+xAoGBAMkp
|
||||
EvAAwab/0zb71YfoNLbQz+Z5965tUEZY0opc2GvB6heMF8+54I0IapKVCITglmbN
|
||||
0pWRRGo0Zyb1rGWoDGgLT6CyJ+gIYpPJWb/iFxUyBQzJzzDkMtAj43eXGSO+7eho
|
||||
qVUXJA5uvjDlP8lLPSyDY/2wP8BPYigzQm8hcGIVAoGBANjVXW9wCPFybv2snKap
|
||||
k9DWW+nRJpX3H9kFONHAtumLAA+9pNVIcvs5yVtxQn+MI9jXphzdrjqc2wYMsbVF
|
||||
XxElyBJxLhbGjFJlI4yFV1KhXmosKymnyb8a5sOli+yyKze2JFlGfUPlmY1r70+u
|
||||
y/TCqRJY+itilEz7I2UMgDLBAoGBALcIT3nfRlTca2OZKwZZSzWYs8JC8hFc13Da
|
||||
ut84cZdCvuwkBTp2J5JLuSScxD6bV149IsIChpyYB8+UNAPfL0KwIAjYcaUXlBJi
|
||||
X+5PGq+nbp7fNU2IJY/rR7p12mMDA9e2+3Q39Q/IxfcZcLuIYSYSezXGW4tw76Ai
|
||||
W+1gILCtAoGBAK5f4pSOG6hSYLqn1f0yqpIiTfeA2FJTUSB1eVkO7Y+YNnYpmFok
|
||||
1FlsFSlFYi8xqgWqwacs8H2uNnWpYKTpeCYLcWWO3KklddhB54f1+5tpOv0pVgji
|
||||
Lczo5hccgURjwx1ebbH8h4rYTBskb9xagw7n28O6BXaGJvx4fjdDwirL
|
||||
-----END RSA PRIVATE KEY-----
|
||||
Certificate:
|
||||
Data:
|
||||
Version: 3 (0x2)
|
||||
Serial Number:
|
||||
81:34:c8:2d:81:f0:54:21
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = Northern Nowhere Trust Anchor
|
||||
Validity
|
||||
Not Before: Mar 6 11:51:48 2025 GMT
|
||||
Not After : Dec 31 11:51:48 2025 GMT
|
||||
Subject:
|
||||
countryName = NN
|
||||
organizationName = Edel Curl Arctic Illudium Research Cloud
|
||||
commonName = localhost
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:bd:d7:58:68:62:0c:68:34:df:a2:1d:d9:34:fc:
|
||||
f1:45:bf:cc:e3:57:38:e6:d3:07:fc:65:e1:b3:28:
|
||||
ad:d6:2c:3b:2e:a9:6a:b9:07:e7:66:1f:b8:a0:c2:
|
||||
75:1d:31:84:3e:5d:98:d3:37:bb:a0:96:97:7f:f7:
|
||||
17:5e:89:ad:6e:bf:8c:0d:ef:c2:7c:f5:3b:76:0a:
|
||||
84:30:ef:bf:2f:c0:8a:a6:50:33:e1:a4:00:bd:0c:
|
||||
0c:79:04:09:d1:45:09:fe:b2:4b:a3:cf:1e:3b:65:
|
||||
b4:5a:a5:a4:86:e0:d6:95:c0:a9:d7:58:ec:8e:4e:
|
||||
72:3f:33:77:f3:3d:b5:6d:63:28:85:8a:49:e5:20:
|
||||
ef:56:9a:ad:f3:9d:e2:b6:ca:66:dd:06:e2:cc:09:
|
||||
86:36:c2:d0:1f:3e:33:bc:bc:c5:23:f7:2a:4c:f0:
|
||||
5b:4f:3c:60:f4:33:f3:dd:c8:ad:83:d2:45:9f:6d:
|
||||
0d:cb:b6:29:94:b8:df:3b:c3:73:7e:95:ef:e6:68:
|
||||
e7:c6:22:79:4a:69:7c:85:4a:88:9d:9a:90:71:42:
|
||||
79:73:3e:b2:ed:e2:0c:4e:53:85:5a:de:e7:85:37:
|
||||
6f:0e:21:e1:f1:f0:1d:09:ec:0f:fd:69:5f:d9:74:
|
||||
71:35:4d:02:73:f3:2d:3e:9c:58:f5:48:d6:63:b4:
|
||||
fb:85
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Alternative Name:
|
||||
DNS:localhost
|
||||
X509v3 Key Usage:
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication
|
||||
X509v3 Subject Key Identifier:
|
||||
F7:A5:D0:5C:C7:C2:37:AA:5D:7A:76:0B:17:61:70:C9:5D:B9:C9:55
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:FALSE
|
||||
Authority Information Access:
|
||||
CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
|
||||
|
||||
X509v3 CRL Distribution Points:
|
||||
|
||||
Full Name:
|
||||
URI:http://test.curl.se/ca/EdelCurlRoot.crl
|
||||
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
28:61:05:e4:55:30:48:40:12:df:f6:fb:64:5e:10:6d:5c:48:
|
||||
d2:ef:b2:c2:27:28:f0:a1:88:5a:c8:ae:cb:87:12:60:04:aa:
|
||||
e0:1e:4c:c3:4c:8e:d5:8a:f8:8c:c8:3f:e5:d7:06:8a:3d:40:
|
||||
c0:ea:03:dd:9c:d6:f5:68:67:71:51:4f:8d:80:1f:d3:53:09:
|
||||
5b:78:be:dc:6d:98:68:c0:38:d2:10:ad:56:95:9c:b7:56:e2:
|
||||
ec:98:b7:6f:3c:f4:b5:1e:94:7b:3d:e2:f7:a4:89:b5:89:61:
|
||||
29:45:ea:05:8d:23:a3:ad:b6:ef:97:21:91:ce:f2:7d:12:3a:
|
||||
e3:fc:e0:eb:85:18:eb:af:b7:51:81:2b:a2:60:01:60:d9:31:
|
||||
96:cb:9c:e3:b9:29:38:f7:51:7d:40:bf:87:6e:42:fa:74:c0:
|
||||
9b:cb:1a:95:63:30:a7:41:b4:65:e3:cc:87:2c:01:d9:00:d8:
|
||||
e3:62:ab:d2:64:37:43:c2:16:36:0f:ae:a6:79:00:d6:37:37:
|
||||
ff:31:6a:77:15:cc:ff:1b:52:33:9b:04:8e:f5:5b:a6:52:60:
|
||||
e8:1c:b8:3e:df:b9:d5:67:ba:3d:23:d6:5a:07:cd:e8:e2:01:
|
||||
0f:57:ea:b0:fb:27:a4:2a:1b:f0:16:01:90:cc:9e:32:13:cc:
|
||||
f1:bf:cb:80
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIESTCCAzGgAwIBAgIJAIE0yC2B8FQhMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
|
||||
BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
|
||||
cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
|
||||
cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFQxCzAJBgNVBAYTAk5O
|
||||
MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
|
||||
b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQC911hoYgxoNN+iHdk0/PFFv8zjVzjm0wf8ZeGzKK3WLDsuqWq5B+dm
|
||||
H7igwnUdMYQ+XZjTN7uglpd/9xdeia1uv4wN78J89Tt2CoQw778vwIqmUDPhpAC9
|
||||
DAx5BAnRRQn+skujzx47ZbRapaSG4NaVwKnXWOyOTnI/M3fzPbVtYyiFiknlIO9W
|
||||
mq3zneK2ymbdBuLMCYY2wtAfPjO8vMUj9ypM8FtPPGD0M/PdyK2D0kWfbQ3LtimU
|
||||
uN87w3N+le/maOfGInlKaXyFSoidmpBxQnlzPrLt4gxOU4Va3ueFN28OIeHx8B0J
|
||||
7A/9aV/ZdHE1TQJz8y0+nFj1SNZjtPuFAgMBAAGjggEIMIIBBDAWBgNVHREEDzAN
|
||||
ggtsb2NhbGhvc3QAaDALBgNVHQ8EBAMCA6gwEwYDVR0lBAwwCgYIKwYBBQUHAwEw
|
||||
HQYDVR0OBBYEFPel0FzHwjeqXXp2CxdhcMlduclVMB8GA1UdIwQYMBaAFJ0rzpW/
|
||||
2CKRouWt/nkO6SPhTSgyMAkGA1UdEwQCMAAwQwYIKwYBBQUHAQEENzA1MDMGCCsG
|
||||
AQUFBzAChidodHRwOi8vdGVzdC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIw
|
||||
OAYDVR0fBDEwLzAtoCugKYYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3Vy
|
||||
bFJvb3QuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQAoYQXkVTBIQBLf9vtkXhBtXEjS
|
||||
77LCJyjwoYhayK7LhxJgBKrgHkzDTI7ViviMyD/l1waKPUDA6gPdnNb1aGdxUU+N
|
||||
gB/TUwlbeL7cbZhowDjSEK1WlZy3VuLsmLdvPPS1HpR7PeL3pIm1iWEpReoFjSOj
|
||||
rbbvlyGRzvJ9Ejrj/ODrhRjrr7dRgSuiYAFg2TGWy5zjuSk491F9QL+HbkL6dMCb
|
||||
yxqVYzCnQbRl48yHLAHZANjjYqvSZDdDwhY2D66meQDWNzf/MWp3Fcz/G1IzmwSO
|
||||
9VumUmDoHLg+37nVZ7o9I9ZaB83o4gEPV+qw+yekKhvwFgGQzJ4yE8zxv8uA
|
||||
-----END CERTIFICATE-----
|
||||
Binary file not shown.
@ -1,9 +0,0 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvddYaGIMaDTfoh3ZNPzx
|
||||
Rb/M41c45tMH/GXhsyit1iw7LqlquQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomt
|
||||
br+MDe/CfPU7dgqEMO+/L8CKplAz4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDW
|
||||
lcCp11jsjk5yPzN38z21bWMohYpJ5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzF
|
||||
I/cqTPBbTzxg9DPz3citg9JFn20Ny7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQ
|
||||
cUJ5cz6y7eIMTlOFWt7nhTdvDiHh8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7
|
||||
hQIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
@ -40,7 +40,7 @@ simple HTTPS GET with DER public key pinning (Schannel variant)
|
||||
CURL_SSL_BACKEND=schannel
|
||||
</setenv>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.der --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.der --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -36,7 +36,7 @@ https test-localhost.pem
|
||||
simple HTTPS GET with DER public key pinning
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -27,7 +27,7 @@ https test-localhost.pem
|
||||
HTTPS wrong DER pinnedpubkey but right CN
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.der https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.der https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -36,7 +36,7 @@ https test-localhost.pem
|
||||
simple HTTPS GET with PEM public key pinning
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.pem https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.pem https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -27,7 +27,7 @@ https test-localhost.pem
|
||||
HTTPS wrong PEM pinnedpubkey but right CN
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pem https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pem https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -36,7 +36,7 @@ https test-localhost.pem
|
||||
simple HTTPS GET with base64-sha256 public key pinning
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%SRCDIR/certs/test-localhost.pub.der]sha256b64file% https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%CERTDIR/certs/test-localhost.pub.der]sha256b64file% https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -27,7 +27,7 @@ https test-localhost.pem
|
||||
HTTPS wrong base64-sha256 pinnedpubkey but right CN
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//bSIggTf+ikMG0CtmDlpMVBd7yi7H1md4URogRPqerso= https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//bSIggTf+ikMG0CtmDlpMVBd7yi7H1md4URogRPqerso= https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -26,7 +26,7 @@ https test-localhost.pem
|
||||
pinnedpubkey no-match must fail even when insecure
|
||||
</name>
|
||||
<command>
|
||||
-4 --insecure --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.nn.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --insecure --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.nn.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -39,7 +39,7 @@ Ignore certificate revocation "best effort" strategy
|
||||
CURL_SSL_BACKEND=schannel
|
||||
</setenv>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -40,7 +40,7 @@ simple HTTPS GET with PEM public key pinning (Schannel variant)
|
||||
CURL_SSL_BACKEND=schannel
|
||||
</setenv>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.pem --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.pem --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -40,7 +40,7 @@ simple HTTPS GET with base64-sha256 public key pinning (Schannel variant)
|
||||
CURL_SSL_BACKEND=schannel
|
||||
</setenv>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%SRCDIR/certs/test-localhost.pub.der]sha256b64file% --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%CERTDIR/certs/test-localhost.pub.der]sha256b64file% --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -39,7 +39,7 @@ http/3
|
||||
HTTP/3 GET:
|
||||
</name>
|
||||
<command>
|
||||
--cacert %SRCDIR/certs/test-ca.crt --http3 --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
|
||||
--cacert %CERTDIR/certs/test-ca.crt --http3 --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -59,7 +59,7 @@ lib%TESTNUMBER
|
||||
HTTP GET multiple over HTTP/3
|
||||
</name>
|
||||
<command>
|
||||
https://%HOSTIP:%HTTP3PORT/path/%TESTNUMBER %HOSTIP %HTTP3PORT %SRCDIR/certs/test-ca.cacert
|
||||
https://%HOSTIP:%HTTP3PORT/path/%TESTNUMBER %HOSTIP %HTTP3PORT %CERTDIR/certs/test-ca.cacert
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -41,7 +41,7 @@ HTTP/3 header-api
|
||||
<setenv>
|
||||
</setenv>
|
||||
<command>
|
||||
-w '%{header_json}\n' --http3-only --cacert %SRCDIR/certs/test-ca.crt --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
|
||||
-w '%{header_json}\n' --http3-only --cacert %CERTDIR/certs/test-ca.crt --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
|
||||
</command>
|
||||
|
||||
</client>
|
||||
|
||||
@ -35,7 +35,7 @@ https test-localhost-san-first.pem
|
||||
HTTPS GET to localhost, first subject alt name matches, CN does not match
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -35,7 +35,7 @@ https test-localhost-san-last.pem
|
||||
HTTPS GET to localhost, last subject alt name matches, CN does not match
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -39,7 +39,7 @@ HTTPS GET to localhost, first subject alt name matches, CN does not match (Schan
|
||||
CURL_SSL_BACKEND=schannel
|
||||
</setenv>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -39,7 +39,7 @@ HTTPS GET to localhost, last subject alt name matches, CN does not match (Schann
|
||||
CURL_SSL_BACKEND=schannel
|
||||
</setenv>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -35,7 +35,7 @@ https test-localhost.pem
|
||||
simple HTTPS GET
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -26,7 +26,7 @@ https test-localhost0h.pem
|
||||
HTTPS wrong subjectAltName but right CN
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -26,7 +26,7 @@ https test-localhost.nn.pem
|
||||
HTTPS GET to localhost and null-prefixed CN cert
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -22,7 +22,7 @@ https test-localhost.pem
|
||||
CRL test
|
||||
</name>
|
||||
<command>
|
||||
-4 --cacert %SRCDIR/certs/test-ca.crt --crlfile %SRCDIR/certs/test-localhost.crl https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
-4 --cacert %CERTDIR/certs/test-ca.crt --crlfile %CERTDIR/certs/test-localhost.crl https://localhost:%HTTPSPORT/%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -165,7 +165,7 @@ lib%TESTNUMBER
|
||||
</tool>
|
||||
# provide URL and ca-cert
|
||||
<command>
|
||||
https://localhost:%HTTPSPORT/%TESTNUMBER %SRCDIR/certs/test-ca.crt
|
||||
https://localhost:%HTTPSPORT/%TESTNUMBER %CERTDIR/certs/test-ca.crt
|
||||
</command>
|
||||
</client>
|
||||
|
||||
|
||||
@ -50,7 +50,7 @@ s/^(.*):(.*)[\r\n]*//
|
||||
</stripfile>
|
||||
<stdout>
|
||||
nomnom
|
||||
%strippemfile[%SRCDIR/certs/test-localhost.crt]strippemfile%
|
||||
%strippemfile[%CERTDIR/certs/test-localhost.crt]strippemfile%
|
||||
</stdout>
|
||||
|
||||
</verify>
|
||||
|
||||
@ -37,7 +37,7 @@ lib%TESTNUMBER
|
||||
</tool>
|
||||
# provide URL and ca-cert
|
||||
<command>
|
||||
https://localhost:%HTTPSPORT/%TESTNUMBER %SRCDIR/certs/test-ca.crt
|
||||
https://localhost:%HTTPSPORT/%TESTNUMBER %CERTDIR/certs/test-ca.crt
|
||||
</command>
|
||||
# Ensure that we're running on localhost because we're checking the host name
|
||||
<precheck>
|
||||
|
||||
@ -102,11 +102,8 @@ while(@ARGV) {
|
||||
shift @ARGV;
|
||||
}
|
||||
|
||||
my $srcdir = dirname(__FILE__);
|
||||
$certfile = "$srcdir/certs/$cert.pem";
|
||||
$keyfile = "$srcdir/certs/$cert.key";
|
||||
$certfile = abs_path($certfile);
|
||||
$keyfile = abs_path($keyfile);
|
||||
$certfile = abs_path("certs/$cert.pem");
|
||||
$keyfile = abs_path("certs/$cert.key");
|
||||
|
||||
my $cmdline="$nghttpx --backend=$connect ".
|
||||
"--backend-keep-alive-timeout=500ms ".
|
||||
|
||||
@ -102,11 +102,8 @@ while(@ARGV) {
|
||||
shift @ARGV;
|
||||
}
|
||||
|
||||
my $srcdir = dirname(__FILE__);
|
||||
$certfile = "$srcdir/certs/$cert.pem";
|
||||
$keyfile = "$srcdir/certs/$cert.key";
|
||||
$certfile = abs_path($certfile);
|
||||
$keyfile = abs_path($keyfile);
|
||||
$certfile = abs_path("certs/$cert.pem");
|
||||
$keyfile = abs_path("certs/$cert.key");
|
||||
|
||||
my $cmdline="$nghttpx --http2-proxy --backend=$connect ".
|
||||
"--backend-keep-alive-timeout=500ms ".
|
||||
|
||||
@ -196,7 +196,7 @@ if(!$logfile) {
|
||||
$conffile = "$piddir/${proto}_stunnel.conf";
|
||||
|
||||
$capath = abs_path($path);
|
||||
$certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"certs/test-localhost.pem");
|
||||
$certfile = $stuncert ? "certs/$stuncert" : "certs/test-localhost.pem";
|
||||
$certfile = abs_path($certfile);
|
||||
|
||||
my $ssltext = uc($proto) ." SSL/TLS:";
|
||||
|
||||
@ -3083,6 +3083,7 @@ sub subvariables {
|
||||
$$thing =~ s/${prefix}FILE_PWD/$file_pwd/g;
|
||||
$$thing =~ s/${prefix}SSH_PWD/$ssh_pwd/g;
|
||||
$$thing =~ s/${prefix}SRCDIR/$srcdir/g;
|
||||
$$thing =~ s/${prefix}CERTDIR/./g;
|
||||
$$thing =~ s/${prefix}USER/$USER/g;
|
||||
$$thing =~ s/${prefix}DEV_NULL/$dev_null/g;
|
||||
|
||||
|
||||
Loading…
Reference in New Issue
Block a user