From 7e570e3943ea721c1e54045a47a851915fd18dfc Mon Sep 17 00:00:00 2001 From: cameronrich Date: Mon, 27 Dec 2010 09:40:51 +0000 Subject: [PATCH] Fixed 3132700 (close_notify), 3078672 (regular_square), 3072881 (process_server_hello). Using Montgomery until q_dash issue solved. git-svn-id: svn://svn.code.sf.net/p/axtls/code/trunk@180 9a5d90b5-6617-0410-8a86-bb477d3ed2e3 --- crypto/bigint.c | 61 ++++++++--------- crypto/bigint_impl.h | 23 ++++++- crypto/rsa.c | 2 +- samples/c/axssl.c | 5 ++ ssl/BigIntConfig.in | 2 +- ssl/Makefile | 4 +- ssl/asn1.c | 1 + ssl/cert.h | 56 ++++++++-------- ssl/private_key.h | 102 ++++++++++++++--------------- ssl/ssl.h | 5 ++ ssl/test/axTLS.ca_key.pem | 26 ++++---- ssl/test/axTLS.ca_x509.cer | Bin 483 -> 483 bytes ssl/test/axTLS.ca_x509.pem | 20 +++--- ssl/test/axTLS.device_key | Bin 609 -> 608 bytes ssl/test/axTLS.device_key.pem | 26 ++++---- ssl/test/axTLS.encrypted.p8 | Bin 385 -> 383 bytes ssl/test/axTLS.encrypted_pem.p8 | 17 +++-- ssl/test/axTLS.key_1024 | Bin 609 -> 609 bytes ssl/test/axTLS.key_1024.pem | 26 ++++---- ssl/test/axTLS.key_1042 | Bin 0 -> 619 bytes ssl/test/axTLS.key_1042.pem | 15 +++++ ssl/test/axTLS.key_2048 | Bin 1191 -> 1192 bytes ssl/test/axTLS.key_2048.pem | 50 +++++++------- ssl/test/axTLS.key_4096 | Bin 2349 -> 2348 bytes ssl/test/axTLS.key_4096.pem | 98 +++++++++++++-------------- ssl/test/axTLS.key_512 | Bin 321 -> 319 bytes ssl/test/axTLS.key_512.pem | 14 ++-- ssl/test/axTLS.key_aes128.pem | 16 ++--- ssl/test/axTLS.key_aes256.pem | 16 ++--- ssl/test/axTLS.noname.p12 | Bin 1483 -> 1483 bytes ssl/test/axTLS.unencrypted.p8 | Bin 347 -> 345 bytes ssl/test/axTLS.unencrypted_pem.p8 | 16 ++--- ssl/test/axTLS.withCA.p12 | Bin 2089 -> 2089 bytes ssl/test/axTLS.withoutCA.p12 | Bin 1573 -> 1573 bytes ssl/test/axTLS.x509_1024.cer | Bin 475 -> 475 bytes ssl/test/axTLS.x509_1024.pem | 18 ++--- ssl/test/axTLS.x509_1042.cer | Bin 0 -> 477 bytes ssl/test/axTLS.x509_1042.pem | 12 ++++ ssl/test/axTLS.x509_2048.cer | Bin 607 -> 607 bytes ssl/test/axTLS.x509_2048.pem | 24 +++---- ssl/test/axTLS.x509_4096.cer | Bin 863 -> 863 bytes ssl/test/axTLS.x509_4096.pem | 34 +++++----- ssl/test/axTLS.x509_512.cer | Bin 406 -> 406 bytes ssl/test/axTLS.x509_512.pem | 18 ++--- ssl/test/axTLS.x509_aes128.pem | 18 ++--- ssl/test/axTLS.x509_aes256.pem | 18 ++--- ssl/test/axTLS.x509_bad_after.pem | 18 ++--- ssl/test/axTLS.x509_bad_before.pem | 14 ++-- ssl/test/axTLS.x509_device.cer | Bin 401 -> 401 bytes ssl/test/axTLS.x509_device.pem | 38 +++++------ ssl/test/killopenssl.sh | 1 + ssl/test/make_certs.sh | 25 ++++--- ssl/test/ssltest.c | 67 ++++++++++++++++--- ssl/tls1.c | 18 +++-- ssl/tls1.h | 1 + ssl/tls1_clnt.c | 6 ++ www/index.html | 2 +- 57 files changed, 532 insertions(+), 401 deletions(-) create mode 100644 ssl/test/axTLS.key_1042 create mode 100644 ssl/test/axTLS.key_1042.pem create mode 100644 ssl/test/axTLS.x509_1042.cer create mode 100644 ssl/test/axTLS.x509_1042.pem diff --git a/crypto/bigint.c b/crypto/bigint.c index 1d95bd549..28b3c0ca0 100644 --- a/crypto/bigint.c +++ b/crypto/bigint.c @@ -442,18 +442,18 @@ bigint *bi_divide(BI_CTX *ctx, bigint *u, bigint *v, int is_mod) else { q_dash = (comp)(((long_comp)U(0)*COMP_RADIX + U(1))/V1); - } - if (v->size > 1 && V2) - { - /* we are implementing the following: - if (V2*q_dash > (((U(0)*COMP_RADIX + U(1) - - q_dash*V1)*COMP_RADIX) + U(2))) ... */ - comp inner = (comp)((long_comp)COMP_RADIX*U(0) + U(1) - - (long_comp)q_dash*V1); - if ((long_comp)V2*q_dash > (long_comp)inner*COMP_RADIX + U(2)) + if (v->size > 1 && V2) { - q_dash--; + /* we are implementing the following: + if (V2*q_dash > (((U(0)*COMP_RADIX + U(1) - + q_dash*V1)*COMP_RADIX) + U(2))) ... */ + comp inner = (comp)((long_comp)COMP_RADIX*U(0) + U(1) - + (long_comp)q_dash*V1); + if ((long_comp)V2*q_dash > (long_comp)inner*COMP_RADIX + U(2)) + { + q_dash--; + } } } @@ -926,55 +926,52 @@ bigint *bi_multiply(BI_CTX *ctx, bigint *bia, bigint *bib) /* * Perform the actual square operion. It takes into account overflow. */ -static bigint *regular_square(BI_CTX *ctx, bigint *bi) +bigint *regular_square(BI_CTX *ctx, bigint *bi) { int t = bi->size; int i = 0, j; bigint *biR = alloc(ctx, t*2); comp *w = biR->comps; comp *x = bi->comps; - comp carry; - + long_comp carry; memset(w, 0, biR->size*COMP_BYTE_SIZE); do { long_comp tmp = w[2*i] + (long_comp)x[i]*x[i]; - comp u = 0; + uint8_t c = 0, q = 0; w[2*i] = (comp)tmp; carry = (comp)(tmp >> COMP_BIT_SIZE); for (j = i+1; j < t; j++) { + c = q = 0; long_comp xx = (long_comp)x[i]*x[j]; - long_comp xx2 = 2*xx; - long_comp blob = (long_comp)w[i+j]+carry; + if (COMP_MAX-xx < xx) + c = 1; - if (u) /* previous overflow */ - { - blob += COMP_RADIX; - } + tmp = (xx<<1); + if (COMP_MAX-tmp < w[i+j]) + c = 1; - u = 0; - tmp = xx2 + blob; + tmp += w[i+j]; - /* check for overflow */ - if ((COMP_MAX-xx) < xx || (COMP_MAX-xx2) < blob) - { - u = 1; - } + if (COMP_MAX-tmp < carry) + c = q = 1; + tmp += carry; w[i+j] = (comp)tmp; - carry = (comp)(tmp >> COMP_BIT_SIZE); + carry = tmp >> COMP_BIT_SIZE; + + if (c) + carry += COMP_RADIX; } w[i+t] += carry; - if (u) - { - w[i+t+1] = 1; /* add carry */ - } + if (c && !q) + w[i+t+1] = 1; /* add carry */ } while (++i < t); bi_free(ctx, bi); diff --git a/crypto/bigint_impl.h b/crypto/bigint_impl.h index 1483154a4..0b76aee2d 100644 --- a/crypto/bigint_impl.h +++ b/crypto/bigint_impl.h @@ -41,7 +41,28 @@ #define BIGINT_NUM_MODS 1 #endif +//#define REGISTER_8 1 + /* Architecture specific functions for big ints */ +#if defined(REGISTER_8) +#define COMP_RADIX 256U /**< Max component + 1 */ +#define COMP_MAX 0xFFFFU/**< (Max dbl comp -1) */ +#define COMP_BIT_SIZE 8 /**< Number of bits in a component. */ +#define COMP_BYTE_SIZE 1 /**< Number of bytes in a component. */ +#define COMP_NUM_NIBBLES 2 /**< Used For diagnostics only. */ +typedef uint8_t comp; /**< A single precision component. */ +typedef uint16_t long_comp; /**< A double precision component. */ +typedef int16_t slong_comp; /**< A signed double precision component. */ +#elif defined(REGISTER_16) +#define COMP_RADIX 65536U /**< Max component + 1 */ +#define COMP_MAX 0xFFFFFFFFU/**< (Max dbl comp -1) */ +#define COMP_BIT_SIZE 16 /**< Number of bits in a component. */ +#define COMP_BYTE_SIZE 2 /**< Number of bytes in a component. */ +#define COMP_NUM_NIBBLES 4 /**< Used For diagnostics only. */ +typedef uint16_t comp; /**< A single precision component. */ +typedef uint32_t long_comp; /**< A double precision component. */ +typedef int32_t slong_comp; /**< A signed double precision component. */ +#else /* regular 32 bit */ #ifdef WIN32 #define COMP_RADIX 4294967296i64 #define COMP_MAX 0xFFFFFFFFFFFFFFFFui64 @@ -52,10 +73,10 @@ #define COMP_BIT_SIZE 32 /**< Number of bits in a component. */ #define COMP_BYTE_SIZE 4 /**< Number of bytes in a component. */ #define COMP_NUM_NIBBLES 8 /**< Used For diagnostics only. */ - typedef uint32_t comp; /**< A single precision component. */ typedef uint64_t long_comp; /**< A double precision component. */ typedef int64_t slong_comp; /**< A signed double precision component. */ +#endif /** * @struct _bigint diff --git a/crypto/rsa.c b/crypto/rsa.c index 31627bb31..0be429856 100644 --- a/crypto/rsa.c +++ b/crypto/rsa.c @@ -88,7 +88,7 @@ void RSA_pub_key_new(RSA_CTX **ctx, *ctx = (RSA_CTX *)calloc(1, sizeof(RSA_CTX)); rsa_ctx = *ctx; rsa_ctx->bi_ctx = bi_ctx; - rsa_ctx->num_octets = (mod_len & 0xFFF0); + rsa_ctx->num_octets = mod_len; rsa_ctx->m = bi_import(bi_ctx, modulus, mod_len); bi_set_mod(bi_ctx, rsa_ctx->m, BIGINT_M_OFFSET); rsa_ctx->e = bi_import(bi_ctx, pub_exp, pub_len); diff --git a/samples/c/axssl.c b/samples/c/axssl.c index 6892ee452..d9d9a6071 100644 --- a/samples/c/axssl.c +++ b/samples/c/axssl.c @@ -385,6 +385,11 @@ static void do_server(int argc, char *argv[]) printf("%s", read_buf); TTY_FLUSH(); } + else if (res == SSL_CLOSE_NOTIFY) + { + printf("shutting down SSL\n"); + TTY_FLUSH(); + } else if (res < SSL_OK && !quiet) { ssl_display_error(res); diff --git a/ssl/BigIntConfig.in b/ssl/BigIntConfig.in index 04c7438c0..cace9c568 100644 --- a/ssl/BigIntConfig.in +++ b/ssl/BigIntConfig.in @@ -8,7 +8,7 @@ menu "BigInt Options" choice prompt "Reduction Algorithm" - default CONFIG_BIGINT_BARRETT + default CONFIG_BIGINT_MONTGOMERY config CONFIG_BIGINT_CLASSICAL bool "Classical" diff --git a/ssl/Makefile b/ssl/Makefile index 62a62047d..aafe7bc9b 100644 --- a/ssl/Makefile +++ b/ssl/Makefile @@ -91,10 +91,10 @@ include $(AXTLS_HOME)/config/makefile.post ifndef CONFIG_PLATFORM_WIN32 # Linux/Unix/Cygwin -$(TARGET1) : $(OBJ) +$(TARGET1) : $(CRYPTO_OBJ) $(OBJ) $(AR) -r $@ $(CRYPTO_OBJ) $(OBJ) -$(TARGET2) : $(OBJ) +$(TARGET2) : $(CRYPTO_OBJ) $(OBJ) ifndef CONFIG_PLATFORM_CYGWIN $(LD) $(LDFLAGS) $(LDSHARED) -Wl,-soname,$(LIBMAJOR) -o $(AXTLS_HOME)/$(STAGE)/$(LIBMINOR) $(CRYPTO_OBJ) $(OBJ) cd $(AXTLS_HOME)/$(STAGE); ln -sf $(LIBMINOR) $(LIBMAJOR); ln -sf $(LIBMAJOR) $(BASETARGET); cd - diff --git a/ssl/asn1.c b/ssl/asn1.c index ee474f4c1..ca2701ef3 100644 --- a/ssl/asn1.c +++ b/ssl/asn1.c @@ -210,6 +210,7 @@ static int asn1_get_utc_time(const uint8_t *buf, int *offset, time_t *t) if (buf[(*offset)++] != ASN1_UTC_TIME) goto end_utc_time; + len = get_asn1_length(buf, offset); t_offset = *offset; diff --git a/ssl/cert.h b/ssl/cert.h index 7a85d2d84..30c7b6588 100644 --- a/ssl/cert.h +++ b/ssl/cert.h @@ -1,43 +1,43 @@ unsigned char default_certificate[] = { - 0x30, 0x82, 0x01, 0xd7, 0x30, 0x82, 0x01, 0x40, 0x02, 0x09, 0x00, 0xf1, - 0xc3, 0x87, 0xc0, 0xd4, 0xf4, 0x57, 0xc3, 0x30, 0x0d, 0x06, 0x09, 0x2a, + 0x30, 0x82, 0x01, 0xd7, 0x30, 0x82, 0x01, 0x40, 0x02, 0x09, 0x00, 0xab, + 0x08, 0x18, 0xa7, 0x03, 0x07, 0x27, 0xfd, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x05, 0x05, 0x00, 0x30, 0x34, 0x31, 0x32, 0x30, 0x30, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x13, 0x29, 0x61, 0x78, 0x54, 0x4c, 0x53, 0x20, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x20, 0x44, 0x6f, 0x64, 0x67, 0x79, 0x20, 0x43, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x20, 0x41, 0x75, 0x74, 0x68, 0x6f, - 0x72, 0x69, 0x74, 0x79, 0x30, 0x1e, 0x17, 0x0d, 0x30, 0x36, 0x30, 0x36, - 0x30, 0x37, 0x31, 0x31, 0x34, 0x34, 0x33, 0x32, 0x5a, 0x17, 0x0d, 0x33, - 0x33, 0x31, 0x30, 0x32, 0x33, 0x31, 0x31, 0x34, 0x34, 0x33, 0x32, 0x5a, + 0x72, 0x69, 0x74, 0x79, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x30, 0x31, 0x32, + 0x32, 0x36, 0x32, 0x32, 0x33, 0x33, 0x33, 0x39, 0x5a, 0x17, 0x0d, 0x32, + 0x34, 0x30, 0x39, 0x30, 0x33, 0x32, 0x32, 0x33, 0x33, 0x33, 0x39, 0x5a, 0x30, 0x2c, 0x31, 0x16, 0x30, 0x14, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x13, 0x0d, 0x61, 0x78, 0x54, 0x4c, 0x53, 0x20, 0x50, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x31, 0x12, 0x30, 0x10, 0x06, 0x03, 0x55, 0x04, 0x03, 0x13, 0x09, 0x31, 0x32, 0x37, 0x2e, 0x30, 0x2e, 0x30, 0x2e, 0x31, 0x30, 0x81, 0x9f, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x81, 0x8d, 0x00, 0x30, 0x81, 0x89, 0x02, - 0x81, 0x81, 0x00, 0xd8, 0xe0, 0xbf, 0x15, 0xde, 0xea, 0xaf, 0xe8, 0xd5, - 0xfd, 0x0b, 0xa8, 0xa8, 0xb3, 0xd7, 0x46, 0x5d, 0xa7, 0x26, 0x6c, 0x0c, - 0xb5, 0xd9, 0xbc, 0xc6, 0xf8, 0xc0, 0x78, 0xd0, 0xf6, 0x56, 0x65, 0xf8, - 0x29, 0x48, 0x0e, 0x7b, 0x0b, 0xa6, 0x25, 0x7e, 0xe8, 0x7b, 0x79, 0x6f, - 0x38, 0xe5, 0xb5, 0xb7, 0xf4, 0xe0, 0x9c, 0x91, 0x60, 0xf4, 0x06, 0xf3, - 0x40, 0x1e, 0xf9, 0x91, 0x19, 0xa9, 0x2f, 0x47, 0x43, 0xb5, 0x9b, 0x1e, - 0xdc, 0xf6, 0xaa, 0x1c, 0x49, 0x79, 0x21, 0x28, 0xcb, 0xaa, 0x49, 0x73, - 0xd9, 0x09, 0x05, 0x4c, 0x02, 0xf2, 0x4c, 0x4d, 0x6c, 0x1c, 0x80, 0xa7, - 0x14, 0x91, 0x44, 0xfc, 0x12, 0xb3, 0xe1, 0xe7, 0xe3, 0x4f, 0x44, 0xba, - 0x8c, 0xc3, 0x74, 0x39, 0xe8, 0x4c, 0xd0, 0xd4, 0x4c, 0x24, 0x61, 0xb4, - 0x40, 0x95, 0x8c, 0xc0, 0x0a, 0xb7, 0x02, 0x39, 0x31, 0x85, 0x93, 0x02, + 0x81, 0x81, 0x00, 0xcd, 0xfd, 0x89, 0x48, 0xbe, 0x36, 0xb9, 0x95, 0x76, + 0xd4, 0x13, 0x30, 0x0e, 0xbf, 0xb2, 0xed, 0x67, 0x0a, 0xc0, 0x16, 0x3f, + 0x51, 0x09, 0x9d, 0x29, 0x2f, 0xb2, 0x6d, 0x3f, 0x3e, 0x6c, 0x2f, 0x90, + 0x80, 0xa1, 0x71, 0xdf, 0xbe, 0x38, 0xc5, 0xcb, 0xa9, 0x9a, 0x40, 0x14, + 0x90, 0x0a, 0xf9, 0xb7, 0x07, 0x0b, 0xe1, 0xda, 0xe7, 0x09, 0xbf, 0x0d, + 0x57, 0x41, 0x86, 0x60, 0xa1, 0xc1, 0x27, 0x91, 0x5b, 0x0a, 0x98, 0x46, + 0x1b, 0xf6, 0xa2, 0x84, 0xf8, 0x65, 0xc7, 0xce, 0x2d, 0x96, 0x17, 0xaa, + 0x91, 0xf8, 0x61, 0x04, 0x50, 0x70, 0xeb, 0xb4, 0x43, 0xb7, 0xdc, 0x9a, + 0xcc, 0x31, 0x01, 0x14, 0xd4, 0xcd, 0xcc, 0xc2, 0x37, 0x6d, 0x69, 0x82, + 0xd6, 0xc6, 0xc4, 0xbe, 0xf2, 0x34, 0xa5, 0xc9, 0xa6, 0x19, 0x53, 0x32, + 0x7a, 0x86, 0x0e, 0x91, 0x82, 0x0f, 0xa1, 0x42, 0x54, 0xaa, 0x01, 0x02, 0x03, 0x01, 0x00, 0x01, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, - 0xf7, 0x0d, 0x01, 0x01, 0x05, 0x05, 0x00, 0x03, 0x81, 0x81, 0x00, 0x0b, - 0x47, 0x24, 0x52, 0x7d, 0xb6, 0x63, 0x78, 0xbc, 0x80, 0xdd, 0x87, 0x6c, - 0x90, 0x4c, 0x33, 0xc3, 0x5c, 0xa7, 0x97, 0x09, 0x1c, 0x09, 0x4f, 0x9b, - 0x6e, 0xb3, 0x5a, 0x3e, 0x46, 0x92, 0x1a, 0xc7, 0x87, 0x15, 0x59, 0xe1, - 0x88, 0x5c, 0xce, 0x6a, 0xe2, 0x96, 0xaa, 0x32, 0xec, 0xc2, 0xed, 0x78, - 0x8b, 0xe0, 0x90, 0x66, 0x93, 0x14, 0xc3, 0x98, 0xab, 0x33, 0x35, 0xd3, - 0x7d, 0x5d, 0x51, 0x0a, 0x9c, 0xb9, 0x10, 0x58, 0x47, 0x7a, 0x98, 0x95, - 0x64, 0xff, 0x4c, 0x5d, 0x82, 0x19, 0xf9, 0xea, 0x0f, 0x5e, 0x9a, 0xcb, - 0x32, 0x27, 0x64, 0xca, 0x6f, 0x58, 0x8a, 0xd0, 0xc0, 0x36, 0xf4, 0xb9, - 0x63, 0x34, 0xa5, 0xda, 0x36, 0x50, 0x36, 0x49, 0xd2, 0xb7, 0x3a, 0x21, - 0x33, 0x5b, 0x3e, 0xd6, 0x5f, 0x0c, 0x99, 0x83, 0xb7, 0xb2, 0xf7, 0x8b, - 0x44, 0xc4, 0x5e, 0x73, 0x41, 0xa9, 0x02 + 0xf7, 0x0d, 0x01, 0x01, 0x05, 0x05, 0x00, 0x03, 0x81, 0x81, 0x00, 0x40, + 0xb4, 0x94, 0x9a, 0xa8, 0x89, 0x72, 0x1d, 0x07, 0xe5, 0xb3, 0x6b, 0x88, + 0x21, 0xc2, 0x38, 0x36, 0x9e, 0x7a, 0x8c, 0x49, 0x48, 0x68, 0x0c, 0x06, + 0xe8, 0xdb, 0x1f, 0x4e, 0x05, 0xe6, 0x31, 0xe3, 0xfd, 0xe6, 0x0d, 0x6b, + 0xd8, 0x13, 0x17, 0xe0, 0x2d, 0x0d, 0xb8, 0x7e, 0xcb, 0x20, 0x6c, 0xa8, + 0x73, 0xa7, 0xfd, 0xe3, 0xa7, 0xfa, 0xf3, 0x02, 0x60, 0x78, 0x1f, 0x13, + 0x40, 0x45, 0xee, 0x75, 0xf5, 0x10, 0xfd, 0x8f, 0x68, 0x74, 0xd4, 0xac, + 0xae, 0x04, 0x09, 0x55, 0x2c, 0xdb, 0xd8, 0x07, 0x07, 0x65, 0x69, 0x27, + 0x6e, 0xbf, 0x5e, 0x61, 0x40, 0x56, 0x8b, 0xd7, 0x33, 0x3b, 0xff, 0x6e, + 0x53, 0x7e, 0x9d, 0x3f, 0xc0, 0x40, 0x3a, 0xab, 0xa0, 0x50, 0x4e, 0x80, + 0x47, 0x46, 0x0d, 0x1e, 0xdb, 0x4c, 0xf1, 0x1b, 0x5d, 0x3c, 0x2a, 0x54, + 0xa7, 0x4d, 0xfa, 0x7b, 0x72, 0x66, 0xc5 }; unsigned int default_certificate_len = 475; diff --git a/ssl/private_key.h b/ssl/private_key.h index 96a525331..ce7985c5a 100644 --- a/ssl/private_key.h +++ b/ssl/private_key.h @@ -1,54 +1,54 @@ unsigned char default_private_key[] = { - 0x30, 0x82, 0x02, 0x5d, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81, 0x00, 0xd8, - 0xe0, 0xbf, 0x15, 0xde, 0xea, 0xaf, 0xe8, 0xd5, 0xfd, 0x0b, 0xa8, 0xa8, - 0xb3, 0xd7, 0x46, 0x5d, 0xa7, 0x26, 0x6c, 0x0c, 0xb5, 0xd9, 0xbc, 0xc6, - 0xf8, 0xc0, 0x78, 0xd0, 0xf6, 0x56, 0x65, 0xf8, 0x29, 0x48, 0x0e, 0x7b, - 0x0b, 0xa6, 0x25, 0x7e, 0xe8, 0x7b, 0x79, 0x6f, 0x38, 0xe5, 0xb5, 0xb7, - 0xf4, 0xe0, 0x9c, 0x91, 0x60, 0xf4, 0x06, 0xf3, 0x40, 0x1e, 0xf9, 0x91, - 0x19, 0xa9, 0x2f, 0x47, 0x43, 0xb5, 0x9b, 0x1e, 0xdc, 0xf6, 0xaa, 0x1c, - 0x49, 0x79, 0x21, 0x28, 0xcb, 0xaa, 0x49, 0x73, 0xd9, 0x09, 0x05, 0x4c, - 0x02, 0xf2, 0x4c, 0x4d, 0x6c, 0x1c, 0x80, 0xa7, 0x14, 0x91, 0x44, 0xfc, - 0x12, 0xb3, 0xe1, 0xe7, 0xe3, 0x4f, 0x44, 0xba, 0x8c, 0xc3, 0x74, 0x39, - 0xe8, 0x4c, 0xd0, 0xd4, 0x4c, 0x24, 0x61, 0xb4, 0x40, 0x95, 0x8c, 0xc0, - 0x0a, 0xb7, 0x02, 0x39, 0x31, 0x85, 0x93, 0x02, 0x03, 0x01, 0x00, 0x01, - 0x02, 0x81, 0x81, 0x00, 0x94, 0x07, 0x72, 0xe5, 0xbe, 0xad, 0x79, 0x3b, - 0xf7, 0x33, 0x2c, 0x8e, 0x05, 0xf8, 0x1a, 0x6b, 0xd0, 0xe8, 0x91, 0xf5, - 0x16, 0x07, 0xd9, 0x82, 0x5c, 0x5c, 0xd5, 0x22, 0xa1, 0x9e, 0x42, 0x02, - 0x7f, 0x8b, 0xcd, 0xbe, 0xf4, 0x85, 0x52, 0xf6, 0x2c, 0xd5, 0x09, 0xd2, - 0x2c, 0xf4, 0x2c, 0xf6, 0x07, 0x85, 0x80, 0xf9, 0xdc, 0xd0, 0xcc, 0x3f, - 0x22, 0x31, 0x15, 0xf3, 0x49, 0xf2, 0xb5, 0xe2, 0x69, 0x99, 0x04, 0x04, - 0x49, 0x21, 0xdb, 0x9f, 0xa1, 0x54, 0x5a, 0xfa, 0xe4, 0xd9, 0xf9, 0x07, - 0x05, 0xff, 0x9a, 0x65, 0xa4, 0xeb, 0xf2, 0x47, 0xce, 0x56, 0xc7, 0x72, - 0x49, 0x48, 0x5c, 0xe8, 0x14, 0xd7, 0x8f, 0x25, 0xcc, 0x49, 0x29, 0x06, - 0x6a, 0x54, 0x7b, 0x17, 0xdc, 0x9e, 0xd4, 0x53, 0xf0, 0xf5, 0x9e, 0x85, - 0x25, 0xa1, 0xeb, 0x3d, 0xe9, 0x2f, 0xb9, 0x9c, 0xf6, 0xe1, 0x80, 0x81, - 0x02, 0x41, 0x00, 0xee, 0x02, 0x78, 0xc7, 0x78, 0x85, 0x04, 0x97, 0xcc, - 0x36, 0xbd, 0xd6, 0x11, 0xe2, 0xc7, 0x39, 0xd9, 0x34, 0x51, 0x72, 0x6f, - 0x8a, 0x0f, 0xcd, 0x88, 0x32, 0x33, 0x9b, 0xc7, 0xa7, 0x03, 0x77, 0xd9, - 0x82, 0x35, 0xb6, 0xdd, 0x1f, 0xc2, 0xc1, 0x13, 0x40, 0x83, 0x55, 0xeb, - 0x60, 0xeb, 0x81, 0x8e, 0x0c, 0x16, 0x62, 0xb4, 0xb4, 0x3c, 0xeb, 0x08, - 0x80, 0x9c, 0x79, 0xd3, 0x38, 0xca, 0xf1, 0x02, 0x41, 0x00, 0xe9, 0x45, - 0x5f, 0x2e, 0x16, 0xcc, 0x93, 0x50, 0x40, 0xb6, 0x79, 0xbc, 0x38, 0xe0, - 0x56, 0x68, 0x50, 0xd3, 0x2f, 0x73, 0x8c, 0x8c, 0x2a, 0x0e, 0x81, 0x4a, - 0x8a, 0xbb, 0xcc, 0xf0, 0x64, 0x34, 0x46, 0x9f, 0x07, 0x7d, 0x22, 0xb6, - 0xf9, 0x46, 0xac, 0x57, 0x23, 0x8c, 0x1e, 0xeb, 0xd3, 0x05, 0x4d, 0xa8, - 0x83, 0x6a, 0x67, 0xf6, 0xa6, 0xb1, 0xab, 0x8e, 0xc1, 0xef, 0xef, 0x7d, - 0xf0, 0xc3, 0x02, 0x40, 0x2f, 0xc6, 0x59, 0x3e, 0x18, 0xe8, 0x02, 0x73, - 0x01, 0xef, 0xdf, 0x0d, 0x30, 0x4b, 0xe8, 0x17, 0xa9, 0x8c, 0xc1, 0xe8, - 0x89, 0x91, 0x19, 0xf8, 0xf4, 0xa4, 0xb7, 0x0d, 0x46, 0xf7, 0x34, 0x50, - 0x03, 0x5e, 0x0a, 0xb0, 0x29, 0x14, 0xae, 0x00, 0x19, 0x80, 0x32, 0x9c, - 0xb5, 0x81, 0x9f, 0xe4, 0x42, 0x82, 0x14, 0xa0, 0x3d, 0x8b, 0x8c, 0x4a, - 0xd5, 0x4b, 0x13, 0x9d, 0xb4, 0x93, 0x4a, 0xd1, 0x02, 0x40, 0x64, 0x8c, - 0x83, 0x77, 0x61, 0x5a, 0x73, 0x11, 0x3f, 0xa3, 0xa8, 0x1b, 0x8a, 0xc4, - 0xa0, 0x5a, 0x3c, 0xa4, 0x9b, 0x2a, 0x8a, 0x65, 0x8c, 0x67, 0x4e, 0x31, - 0xac, 0x55, 0x41, 0x04, 0x49, 0x9d, 0x02, 0xe7, 0xdf, 0x99, 0x7f, 0xd2, - 0x30, 0xe6, 0xd6, 0xb8, 0x84, 0xd9, 0x0c, 0x27, 0x08, 0x81, 0x9b, 0xb4, - 0xcc, 0x58, 0x9c, 0x51, 0x84, 0x0e, 0xc7, 0x6d, 0x34, 0x89, 0x50, 0xc9, - 0x0f, 0x73, 0x02, 0x41, 0x00, 0xda, 0xde, 0x5e, 0x1a, 0xac, 0x1d, 0x1d, - 0xd7, 0xb9, 0x65, 0x26, 0x00, 0xf5, 0xd4, 0xe4, 0x28, 0x84, 0x86, 0x2f, - 0x00, 0x9c, 0x41, 0x00, 0x52, 0xe1, 0x47, 0x91, 0xc0, 0x52, 0x05, 0x4e, - 0x0f, 0x2f, 0x0d, 0xca, 0x9b, 0x3d, 0x89, 0x41, 0xbf, 0xee, 0x9f, 0xa1, - 0xe6, 0x9d, 0xa4, 0xeb, 0x45, 0x7f, 0xe3, 0xcb, 0xa4, 0x6b, 0x0a, 0xe2, - 0x7e, 0xb0, 0x87, 0x5c, 0x40, 0xb1, 0x51, 0x11, 0x1d + 0x30, 0x82, 0x02, 0x5d, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81, 0x00, 0xcd, + 0xfd, 0x89, 0x48, 0xbe, 0x36, 0xb9, 0x95, 0x76, 0xd4, 0x13, 0x30, 0x0e, + 0xbf, 0xb2, 0xed, 0x67, 0x0a, 0xc0, 0x16, 0x3f, 0x51, 0x09, 0x9d, 0x29, + 0x2f, 0xb2, 0x6d, 0x3f, 0x3e, 0x6c, 0x2f, 0x90, 0x80, 0xa1, 0x71, 0xdf, + 0xbe, 0x38, 0xc5, 0xcb, 0xa9, 0x9a, 0x40, 0x14, 0x90, 0x0a, 0xf9, 0xb7, + 0x07, 0x0b, 0xe1, 0xda, 0xe7, 0x09, 0xbf, 0x0d, 0x57, 0x41, 0x86, 0x60, + 0xa1, 0xc1, 0x27, 0x91, 0x5b, 0x0a, 0x98, 0x46, 0x1b, 0xf6, 0xa2, 0x84, + 0xf8, 0x65, 0xc7, 0xce, 0x2d, 0x96, 0x17, 0xaa, 0x91, 0xf8, 0x61, 0x04, + 0x50, 0x70, 0xeb, 0xb4, 0x43, 0xb7, 0xdc, 0x9a, 0xcc, 0x31, 0x01, 0x14, + 0xd4, 0xcd, 0xcc, 0xc2, 0x37, 0x6d, 0x69, 0x82, 0xd6, 0xc6, 0xc4, 0xbe, + 0xf2, 0x34, 0xa5, 0xc9, 0xa6, 0x19, 0x53, 0x32, 0x7a, 0x86, 0x0e, 0x91, + 0x82, 0x0f, 0xa1, 0x42, 0x54, 0xaa, 0x01, 0x02, 0x03, 0x01, 0x00, 0x01, + 0x02, 0x81, 0x81, 0x00, 0x95, 0xaa, 0x6e, 0x11, 0xf5, 0x6a, 0x8b, 0xa2, + 0xc6, 0x48, 0xc6, 0x7c, 0x37, 0x6b, 0x1f, 0x55, 0x10, 0x76, 0x26, 0x24, + 0xc3, 0xf2, 0x5c, 0x5a, 0xdd, 0x2e, 0xf3, 0xa4, 0x1e, 0xbc, 0x7b, 0x1c, + 0x80, 0x10, 0x85, 0xbc, 0xd8, 0x45, 0x3c, 0xb8, 0xb2, 0x06, 0x53, 0xb5, + 0xd5, 0x7a, 0xe7, 0x0e, 0x92, 0xe6, 0x42, 0xc2, 0xe2, 0x2a, 0xd5, 0xd1, + 0x03, 0x9f, 0x6f, 0x53, 0x74, 0x68, 0x72, 0x8e, 0xbf, 0x03, 0xbb, 0xab, + 0xbd, 0xa1, 0xf9, 0x81, 0x7d, 0x12, 0xd4, 0x9d, 0xb6, 0xae, 0x4c, 0xad, + 0xca, 0xa8, 0xc9, 0x80, 0x8d, 0x0d, 0xd5, 0xd0, 0xa1, 0xbf, 0xec, 0x60, + 0x48, 0x49, 0xed, 0x97, 0x0f, 0x5e, 0xed, 0xfc, 0x39, 0x15, 0x96, 0x9e, + 0x5d, 0xe2, 0xb4, 0x5d, 0x2e, 0x04, 0xdc, 0x08, 0xa2, 0x65, 0x29, 0x2d, + 0x37, 0xfb, 0x62, 0x90, 0x1b, 0x7b, 0xe5, 0x3a, 0x58, 0x05, 0x55, 0xc1, + 0x02, 0x41, 0x00, 0xfc, 0x69, 0x28, 0xc9, 0xa8, 0xc4, 0x5c, 0xe3, 0xd0, + 0x5e, 0xaa, 0xda, 0xde, 0x87, 0x74, 0xdb, 0xcb, 0x40, 0x78, 0x8e, 0x1d, + 0x12, 0x96, 0x16, 0x61, 0x3f, 0xb3, 0x3e, 0xa3, 0x0d, 0xdc, 0x49, 0xa5, + 0x25, 0x87, 0xc5, 0x97, 0x85, 0x9d, 0xbb, 0xb4, 0xf0, 0x44, 0xfd, 0x6c, + 0xe8, 0xd2, 0x8c, 0xec, 0x33, 0x81, 0x46, 0x1e, 0x10, 0x12, 0x33, 0x16, + 0x95, 0x00, 0x4f, 0x75, 0xb4, 0xe5, 0x79, 0x02, 0x41, 0x00, 0xd0, 0xeb, + 0x65, 0x07, 0x10, 0x3b, 0xd9, 0x03, 0xeb, 0xdc, 0x6f, 0x4b, 0x8f, 0xc3, + 0x87, 0xce, 0x76, 0xd6, 0xc5, 0x14, 0x21, 0x4e, 0xe7, 0x4f, 0x1b, 0xe8, + 0x05, 0xf8, 0x84, 0x1a, 0xe0, 0xc5, 0xd6, 0xe3, 0x08, 0xb3, 0x54, 0x57, + 0x02, 0x1f, 0xd4, 0xd9, 0xfb, 0xff, 0x40, 0xb1, 0x56, 0x1c, 0x60, 0xf7, + 0xac, 0x91, 0xf3, 0xd3, 0xc6, 0x7f, 0x84, 0xfd, 0x84, 0x9d, 0xea, 0x26, + 0xee, 0xc9, 0x02, 0x41, 0x00, 0xa6, 0xcf, 0x1c, 0x6c, 0x81, 0x03, 0x1c, + 0x5c, 0x56, 0x05, 0x6a, 0x26, 0x70, 0xef, 0xd6, 0x13, 0xb7, 0x74, 0x28, + 0xf7, 0xca, 0x50, 0xd1, 0x2d, 0x83, 0x21, 0x64, 0xe4, 0xdd, 0x3f, 0x38, + 0xb8, 0xd6, 0xd2, 0x41, 0xb3, 0x1c, 0x9a, 0xea, 0x0d, 0xf5, 0xda, 0xdf, + 0xcd, 0x17, 0x9f, 0x9a, 0x1e, 0x15, 0xaf, 0x48, 0x1c, 0xbd, 0x9b, 0x63, + 0x5b, 0xad, 0xed, 0xd4, 0xa1, 0xae, 0xa9, 0x59, 0x09, 0x02, 0x40, 0x4e, + 0x08, 0xce, 0xa8, 0x8f, 0xc0, 0xba, 0xf3, 0x83, 0x02, 0xc8, 0x33, 0x62, + 0x14, 0x77, 0xc2, 0x7f, 0x93, 0x02, 0xf3, 0xdc, 0xe9, 0x1a, 0xee, 0xea, + 0x8e, 0x84, 0xc4, 0x69, 0x9b, 0x9c, 0x7f, 0x69, 0x1f, 0x4e, 0x1d, 0xa5, + 0x90, 0x06, 0x44, 0x1b, 0x7d, 0xfc, 0x69, 0x40, 0x21, 0xbc, 0xf7, 0x46, + 0xa4, 0xdc, 0x39, 0x7b, 0xe8, 0x8b, 0x49, 0x10, 0x44, 0x9d, 0x67, 0x5a, + 0x91, 0x86, 0x39, 0x02, 0x40, 0x41, 0x2c, 0x4e, 0xfe, 0xd9, 0x90, 0x89, + 0x00, 0x5c, 0x94, 0x0a, 0x4a, 0x7e, 0x1b, 0x1a, 0x80, 0x06, 0x01, 0x37, + 0xda, 0x50, 0x61, 0x9d, 0x9c, 0xfe, 0x25, 0x7f, 0xd8, 0xd4, 0xc4, 0x9e, + 0x81, 0xf2, 0x0c, 0x1e, 0x38, 0x21, 0x1e, 0x90, 0x3f, 0xd4, 0xba, 0x6c, + 0x53, 0xcb, 0xf0, 0x77, 0x79, 0x9b, 0xf1, 0xfa, 0x3f, 0x81, 0xdc, 0xf3, + 0x21, 0x02, 0x6d, 0xb7, 0x95, 0xc3, 0x2e, 0xce, 0xd5 }; unsigned int default_private_key_len = 609; diff --git a/ssl/ssl.h b/ssl/ssl.h index bde6b6865..6b3654d55 100644 --- a/ssl/ssl.h +++ b/ssl/ssl.h @@ -88,6 +88,7 @@ extern "C" { #define SSL_OK 0 #define SSL_NOT_OK -1 #define SSL_ERROR_DEAD -2 +#define SSL_CLOSE_NOTIFY -3 #define SSL_ERROR_CONN_LOST -256 #define SSL_ERROR_SOCK_SETUP_FAILURE -258 #define SSL_ERROR_INVALID_HANDSHAKE -260 @@ -105,6 +106,10 @@ extern "C" { #define SSL_X509_OFFSET -512 #define SSL_X509_ERROR(A) (SSL_X509_OFFSET+A) +/* alert types that are recognized */ +#define SSL_ALERT_TYPE_WARNING 1 +#define SLL_ALERT_TYPE_FATAL 2 + /* these are all the alerts that are recognized */ #define SSL_ALERT_CLOSE_NOTIFY 0 #define SSL_ALERT_UNEXPECTED_MESSAGE 10 diff --git a/ssl/test/axTLS.ca_key.pem b/ssl/test/axTLS.ca_key.pem index 7c8ac8af2..bd4f3241e 100644 --- a/ssl/test/axTLS.ca_key.pem +++ b/ssl/test/axTLS.ca_key.pem @@ -1,15 +1,15 @@ -----BEGIN RSA PRIVATE KEY----- -MIICWwIBAAKBgQCnZdk20fYWh8O6kDTt0AuJWyp0YIrb7W1UNNMPXI5wA4J59IVj -Nmk5wocm9+Hqzbg7rORAN/mHPBhzLAjhnm1HODs36hW15DtbDkkH4wCM/Tsyv79m -n0xq1V6peK3t9vi2D4p/IRjHkYR2jm+BeknopijhY0kHHfpGTHa2DnVirwIDAQAB -AoGAd4Ia5SxYiBU9A0BYyT8yPUm8sYELIaAL4YYk+F6Xwhh/Whnb8MyzquzaGFP4 -Ee30jYYNHlvX5VheDDtvy8OTN5FgKNNdzvW15iA4Hxje04ZI7W87G7OIxm7aYRid -sG4XqZBtsOdj33IRd9hgozywGJ2qRqS6nn2KxRv1w07RniECQQDZAlKxijdn+vQ7 -8/8mXzC+FwQtzeTUCuLrBJcos9I/591ABoxYkWcYLxpFqgCEVwb1qfPBJkL07JPt -Fu6CTnBFAkEAxXmUBs47x5QM99qyBO5UwW0Ksrm/WD4guaaxzQShMt/HzgJl613z -/x4FtxiQJHAr6r2K0t5xTJx89LVKuouYYwJAImue6DAvJ5wDfzrtXo28snn+HLHK -uONdKL/apgcXszE4w74GJsoxWwGlniUf3d3b6b1iP2GtPyIDOJjpjduZLQJAE4jS -VtYB3d1MZxxQLeKxqayyuTlcr0r+C79sqT5C//hZGIzuLhlOMLd0k0cvwxsBjSgQ -2ok8pfp49fAVI1z5xwJAVmJgLc/mSti5A2q3c8HW8qvMJEDPWbpb7p8pg4ePtpa8 -EE3TO4O4J2H+k40C397km4yZXdkNQsiT1zVljJZpiw== +MIICXQIBAAKBgQCfxX6VHEhZNsMIqPPxt53h1UpfX1jU7ctqwBR4dpWRj3H6cCBN +EK8xj7IVcBTJq6vcMRDwrAUrElSIZl8Kv6+ZqhTss2j+E2tfzkzehP9LcAdAR+UM +JPBsYXic/+vmH5JCMO7CXLUsDJmO2q2Z1TjTtchu2DgAueTo0hWRtMvbMwIDAQAB +AoGARYOF+ZZenAJJhSENUiPTm4hTXX98hNgZYw7DWU4u8S/6JT5Xr3AM6YFduBoV +0VDR63GlrzEI5p6JDPeNbn3MBl14ZNZVOOkzenxsCsymCHKhickxR8VlRoN26Xpb +OcMxsnEOJ8zh0F97Re8bsE7OQhk4Z7KtArby2jY1bpSqkRECQQDQ0D9lIq0oINaS +Uezmj/eSlmRjUwF+Vx8t16Yu8mD8CJZUVBEhDn/Xo2GWlkFgbWUoAPanr8zAwKJX +6gImgMVPAkEAw+AxIgMqxs0GmsiesQMPe3Rf5kRId7ApFdhCq15J4URGOTdnyIUj +LBzJpGSiQFb/Fkt5dGrsDzawFd7hlBCa3QJAcWJCqiX0JDAAkx8NJfzSj7Q9+njd +/L5N3dSVFjTiWLhI+K1VR7/ZxzueB+i6wyNjpB8xz8fzxE5VWKtmU4XknQJBAKW+ +K/UK1wR3cnJA9j70RwKA27D98JAOaQWKBAf79en+mqlJn7EGL1fhWCKZ4M0ukBSu +cqw22V6aOO+YtCpUzqUCQQCapy9lw3tDuCAljW8H3p9ce/+wuK1FTnF0TCalgHQp +kn4btRLmj0josAj4lRrzi2uaYfwq39h9OIuy7ES7YKcv -----END RSA PRIVATE KEY----- diff --git a/ssl/test/axTLS.ca_x509.cer b/ssl/test/axTLS.ca_x509.cer index 9c9936b8e98d0b7475e522377e64ee5cb7d9858c..05d1ad10e1bd0f155922ab5c073dc63421fbbbe6 100644 GIT binary patch delta 341 zcmV-b0jmDv1LFe|FoFT!FoFR{0to>7=qD=NDmSW;6Gt>EtE=2G5b&%8D-u+QW?u@wubHY8?6YY86Kh}2Ox}e5OK=B3N97D8@N8jt zod4_QACf{a?!sKPEDV{B+O3(@IMcPrZrC^gx#Z~56_K>d+kZ0x0|5X5FbxI?Duzgg z_YDC71qA>Dfq?)T2~$RpF*+Pnvs-bFEp7UXa!sfLf6i7hw5R_m7=m+^QjWEr`esUp zA-5Maqh*3M^819hNAA9wMjW3)Rc%;1c-<|qIZOvm7|2$G_mKGPp);5{GU15!o}xHP nYt>EtrOAv{*BUt|tW_5@KbF2Rv4QR2q?~OsgvJw*G$qZ&H4&89 delta 341 zcmV-b0jmDv1LFe|FoFT!FoFR{0to<}ZgV)MI;C2X6GDfq?)W3xL`*peHaQC%L9rFu+`!L(F~VuAbis-81tk-U!?PR>rx=X`^>v z7F66sjS9#_Ti&fqR};+Q$KUpJ`w`LA$ggbk@)MB#opCapepcK}N6A!&jPSjWIYk=Qp=vJ9j$jvG#da=72kmR)cHplrHGX$ diff --git a/ssl/test/axTLS.ca_x509.pem b/ssl/test/axTLS.ca_x509.pem index 86f659710..ce03a2051 100644 --- a/ssl/test/axTLS.ca_x509.pem +++ b/ssl/test/axTLS.ca_x509.pem @@ -1,13 +1,13 @@ -----BEGIN CERTIFICATE----- -MIIB3zCCAUgCCQCdbnM4pjqlWjANBgkqhkiG9w0BAQUFADA0MTIwMAYDVQQKEylh -eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNjA2 -MDcxMTQ0MzJaFw0zMzEwMjMxMTQ0MzJaMDQxMjAwBgNVBAoTKWF4VExTIFByb2pl +MIIB3zCCAUgCCQD76Ccq3Co3qjANBgkqhkiG9w0BAQUFADA0MTIwMAYDVQQKEylh +eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xMDEy +MjYyMjMzMzdaFw0yNDA5MDMyMjMzMzdaMDQxMjAwBgNVBAoTKWF4VExTIFByb2pl Y3QgRG9kZ3kgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MIGfMA0GCSqGSIb3DQEBAQUA -A4GNADCBiQKBgQCnZdk20fYWh8O6kDTt0AuJWyp0YIrb7W1UNNMPXI5wA4J59IVj -Nmk5wocm9+Hqzbg7rORAN/mHPBhzLAjhnm1HODs36hW15DtbDkkH4wCM/Tsyv79m -n0xq1V6peK3t9vi2D4p/IRjHkYR2jm+BeknopijhY0kHHfpGTHa2DnVirwIDAQAB -MA0GCSqGSIb3DQEBBQUAA4GBAB0LgNo0oCcwIie5plgwwFybQ8x95q6e3wndM/Mp -3gjcAFbGuchpo3dfFlTcRI0KyERb3q1MVxPM4sff9nT7EdHVyK9s8/ITkP2dcTKc -flbcTEfJVIeM8L2P5F41Hvn9GuGcMW8EmsC06gdbp1LLnqsdrXdMNBsAUBXfgPrU -+UcZ +A4GNADCBiQKBgQCfxX6VHEhZNsMIqPPxt53h1UpfX1jU7ctqwBR4dpWRj3H6cCBN +EK8xj7IVcBTJq6vcMRDwrAUrElSIZl8Kv6+ZqhTss2j+E2tfzkzehP9LcAdAR+UM +JPBsYXic/+vmH5JCMO7CXLUsDJmO2q2Z1TjTtchu2DgAueTo0hWRtMvbMwIDAQAB +MA0GCSqGSIb3DQEBBQUAA4GBABoJU0aQMTocVLNbcY4tbfqLck2oAn/OVjG0p/8p +GIJzlVKOtZ76ZkqHIbcXNKNlgjXy+4S3R+6+mkYcn0JVbVg7eN0tsDlMB04YyFaD +95D47KEzmDky4Yj2nqI4SmvVTf2lyYxV1zknrFUXND+WvjGxge3gpJxtMoTGE5E0 +Jc3F -----END CERTIFICATE----- diff --git a/ssl/test/axTLS.device_key b/ssl/test/axTLS.device_key index 4e981d143e1383828b8a76e18c57e0b0f59b202f..72a173429661c54bafaf35ebdba5a9a96cae5820 100644 GIT binary patch literal 608 zcmV-m0-yabf&yFu0RRGlfdI$Yu-g3!&RpWhvZBIkBv`Y)DwSzu_af7@f>p-pfh5{E z(L4t750a~*;kA%J54%}t&sUBDBGw^eb61K0v04zSb5EL5^m87c1yEU#M1o~&Hv9_`lwbHJ61=&H?7gQEfi0RRC4fq-Xb zsnZm^Bb*V&i<$)p6s<&x?^BUYsYO1{mE|?x8E@?E8tr)&gOWP-GTf7YVdQAle)?%b zm#w{K%!Uo5U>-Bb>d79OrtrefCHVs&m3a$8WRvR~jHs`6U9!& z(;$2m=b}w&oDumzsw#8DI5GDLxr*+0jCL7$M>P?H}x=B54Y8-Vj_Y$;Xk z0zf>>H`GU-GZli>S7o%ZOvVolNk%4?iUVCRQuQLP_OXJ~PFdfKXply*)@~;C5OEj; zemPV}3q0l$owlec2&)1>Ss=`0b1eF`?!Qrz?t6=uoGm*L{W*t}O@2Po;sTY0j-+f& z5k%7U0kBczV6G&kf!$rU)|=gOniXJ+e)n_50zm-VmU|#fVsk?VE#v#|&6;9_gVbJ$ uytH*a@JRQ%ppu`vA77wv5~Q()oO_8u>ciBD00{qvxuLOHOl(&(@wR&t+-Ic-(fn!L=2LAE_OnV2@ezYPqfv?7EVw ztnGa>p_(hpRr+n(N$Ooc;-Ug;rmFgzfA1^_2-*k;^0%11vl#+G0M`^95MJ-`(OR-i zBA|9yFh78sA*+l|0wMujX*I%@o4%O>ok-BGDtQP3_l0oh2@5c16ixpA!QhEf#zLZF zQvyK%tS>_pbrT+q^2G&mI(6scS|AxC&V>TLsLms2K>j$f{xgTlW2bz`iWbV^SZp~M zSQa|OOK(li0kpVqV}#k^0zZ3z5inI#a)-o>oxVh6us#Gh)Z2ij5G5&LpFzr;@!ous zU+nPW;~#)v8B_>M%wA;5u?2*padHnE!MbMQTY+(0Wgg|0 v3cKQF;e2bA5N6M*E~R!7Tl|5&J97n<934}R7|5Rx8jwm@UwAr_9k^bwbVnG3 diff --git a/ssl/test/axTLS.device_key.pem b/ssl/test/axTLS.device_key.pem index 2bcf5e37b..3c2826547 100644 --- a/ssl/test/axTLS.device_key.pem +++ b/ssl/test/axTLS.device_key.pem @@ -1,15 +1,15 @@ -----BEGIN RSA PRIVATE KEY----- -MIICXQIBAAKBgQDUIg4NEiu/diDAlbsWbTAhMKw4iBf2X5ohGJdTO6vhGQdEkhBR -Bgzdl9+0LbVDJY8YStUghwnuztT+IpNCrUtXtRK8Cn3QP+buzSe2ZGPVoEJIbvV/ -QudK/WuUDyTNSRTtW4S3RO36KqtbT6xh1QGTXV3I8sp7qwmcysklqZW8GwIDAQAB -AoGBAKBEDkuPw9+Ftp7pQIxj963LoQGgyEHJ3p9Mfd9TQLrydsw2cf9Uy9mKiWcN -9VkCgkZ/Gt/VRgrW1pIduxXv6O+8S14An+2mTayy3Ga1N6MulD7OHQP9kqR4j8TT -xaYPR/1skjhQ+Y0Uw4NEa3OkQp6lAUEp1aVX/mTfIZBguaUxAkEA/H543Ha6wbUV -iB+pHaBgj1nzarmuEey6kqqs7X0zoZory1X6bdpJ6l0/4qICa6aq+pt/7ywJCNoI -CPK3mL2zGQJBANcUHRBe7/HRWrJNIqB2WDA/gJshq4xOAiIBXWk1wpabvpkCnUjQ -rip5CAL3hXDnCQswZxRN/v7B4IlSxkKiY1MCQQCsL0MUdRMejfLFBXI6defjWiAZ -I86FAr6oziNnQP44sf4zh8pjp3zIihbK4lhsORhYFjrES29NzgG0uHBjhNnhAj97 -gBEwVVNyh8SMnb5EZbA+BDjU24CmECUpYZ9Bypzx3nyTX+zw4uMfgGAZVAhLzF5l -DmYiQqcpoipMsDsoCBcCQQCxBYSicXIPG8G6ZuFbgXFcZR7llgq74mbhfGuVEGbP -qS6ldhJb/IG9O3MFlRwdU44YyJ8QGpBKWF94OpIduF6w +MIICXAIBAAKBgQDH2LDa/QrOXOLHsqLCayRYs74qlWlk9yLTtIJVxumBJNo40TwG +8g+Sq6LhtZBAD7tZaM9XjgIi1iFjc1eKALFaEKpzT5pS9HM0mK48bgwO4DV0gbvC +t1LlwfEC1EkXgoMDumZwF0bpoKldLK9ayp6sXOYe7dcBc8CVjOiqzVCDowIDAQAB +AoGAZ2ap0xS8I5wRxouaBQgUrUSK71ORTalFPs6V5TXfGW/s7RrteRaDkjr2MtyT +f2HkaNV++mlCl629ZsyGDaRgHjPI6skemqbwws4l+QMglXkLQ2ST6xuMqrNlCaKN +Ys0l291VftlS6Bi/C/LD3bwMf6HTGThufchmQ87OvXYtNQkCQQD1jC5jypbk+Ilc +X4aGXaOSsyzrf3QblhPFTsXTIHwV56JNap5D1405LUeH9XvAca+EZyYAg0N/pOXB +rkSXww3PAkEA0Fp8+/zDI00liFOEud2hQ0A/VCqg0+SyCVGvA7AFnuXEURPbMkSB +ktk/x4BBn5DZUJMfOOal/ewbgPNqbClV7QJAPMw31EeeMxWC1VdltLFMxg8NSUYm +looDXTBS9SKu9rGC005Z34xokEaw1m4m9RBxGAR+OVRHCzzmEp22qCkIqwJAWSDM +ZHMs+rXuv1GS7nuLl5wtOxD9OYeUTX4+0uIClYWOpGxNEUTS9QGwUeRgriSlgd1d +ttab3XKaFWCLfvdzxQJBANuWeyBMYnNDBi3j++/NmmKEg9Reiby0dT3wSPe6oJKf +ux9foG8SpLGGnHuJQerD1IkACP+GuaGxWUxsVzPxtns= -----END RSA PRIVATE KEY----- diff --git a/ssl/test/axTLS.encrypted.p8 b/ssl/test/axTLS.encrypted.p8 index 8b0a7eb4117de421cfb917de7f03055fdfe2c28f..446a857dcb3631484bfe05348e438d5032340eef 100644 GIT binary patch literal 383 zcmV-_0f7E6f&qIl90m$1hDe6@4FL=R0Wb~(2(`xmEt!n?jsgM*00e>oSwg|2ApUKXo} zvsi(r<-qWv1&~+-?YEL`nF;)bGOWxB}wuSJav@GEg)}7Yjl+S_#gX$M&)Zhh~UPVHaQx!o3rNp1H_lgKN@v z!1}jkcy{w2d3f#&!=8zT;bkYTYfnk|7fE=x83jHeJT>mn+p7+N9MTpNTptIgp3@++ z#M`|+u70D3RvoTecB0S5Ch{ zHl7H=qA4HIOB;)ah$8h!;8it(u3j>D`liQs0*+k*%XW@PAMoO|ZVtaORrZR~IdUoh zNf*1NZ0jCJOsIuor2OuhY5SBS)gmT$Plt&Ub|ujkSvY}HF3T6ZV$+;=Cj1_ zqiV0Xy#~l}wq>xTcs~vcY@+sZ^yo(jDeDIm8}2%S8s3H&bnWkZz@9kPK8*&28D$i9 z3|2M?_7i99)`(fX3rvXr@m91pnk>4N^QQR5XPP=(qj)V!5qKV+KU4NR01UFqcL=0O z)N0{uLA$ f>0oNt1g(0Zzb?&!uhc`Lu&kDME*dK^i&ZfFoN%%v diff --git a/ssl/test/axTLS.encrypted_pem.p8 b/ssl/test/axTLS.encrypted_pem.p8 index 19ca3c5ea..b059096a3 100644 --- a/ssl/test/axTLS.encrypted_pem.p8 +++ b/ssl/test/axTLS.encrypted_pem.p8 @@ -1,11 +1,10 @@ -----BEGIN ENCRYPTED PRIVATE KEY----- -MIIBfTAcBgoqhkiG9w0BDAEBMA4ECN+YmhCv0ILdAgIIAASCAVu0QEfMkp0xUsNq -0Ek4Nsa/uxcs8N/2P7Ae7qCakkvsdRvvPPH0y+wuj5NgrG6WpPeeEx9fI2oNNTfC -pwncH0Xm99ofVrgMX6XC45LDZtzXNSZd4TdBP6xvlYXbuGegp5GPJ8emzscHCFhC -JfPHemRAcB7DhiWukPosuSUr5R8OluEMJrQLHuQtlDAvMjLEI98lSchPxF8LKCk3 -SS2uCcmc+4WiR0nHG9BOaGi38+PytHAnbfo1mfVSQzLfgLicMAVGysfQ9QOgpQOO -ygYfM/s7Duwbl0rshyXVJP+7BpYJnPtHvO4BTiizU7ZEr4WBiEnnANDrupSdsxeH -+cxZo70YJVdoPdgMd2ke6EIkUhp7HughFg+okldlEtJA4muKeEzwAxZu0TqxOtZ8 -UYRS4Ygk+rN7Y0qTKSYwSkrFBwUDkpctYjRUOeAZ/mYMKWmMn1ejAb5Is7bjEIxl -tw== +MIIBezAcBgoqhkiG9w0BDAEBMA4ECEHizqvZwHfYAgIIAASCAVkWuzUFR3hk3vXG +BoX1ULCIr+Om40+UkD0T/Vxl8zo6Vuvl13vAYqo2eDSNd75yKpYle0gSHn+aVeWZ +gKYrmpSqXF14CDeBXAd2GRwun9EIAwgkv9AMMPGzCXVTVFM/pLyuLexj283qvZf5 +/7Fe/cizYx/DxtiRw9QUsNWYckt3RAM6i87PTBw8uI7NqEMEkstHT51l5TR85JjL +F8ZYSuqv9LH/jkWhoedgID35r+ffjeYV06clebuRJAIcS78LG8833D1SyINlnj4y +Ts2NYf2R4CtR0rDJeDCcucDBnzPPIBv4JqsbUGDTMrlFIGJvmL4RuNP3TNIAk9tZ +FHw2QEBrcv6XNQa8DJwk/162CdDxQG5uWc/Ye4hF5OXzAd6gxKz8u6C3wCq0q3+b +PDc9wulGEejbL/lecZ7qT76CqYLupNmCBFAa8idGjAhU3LDwv4ooGF1aWFiGgG4= -----END ENCRYPTED PRIVATE KEY----- diff --git a/ssl/test/axTLS.key_1024 b/ssl/test/axTLS.key_1024 index 5b6ba1d037b002b0d62c9903a3582daac05f77e2..92429c236606819f460535cddd3c1c1a2386ea7e 100644 GIT binary patch literal 609 zcmV-n0-pUaf&yIv0RRGlfdI|@iAcUSxs`U*6EF_Hvh8OIz!pDI37sh~vTZ*;Y%h?2 zp>f~7IK|7Unm`ng3i-DO3*p-53BL_jL55(V!6%Vh3YbP4_M(LNWyj7fmKUm#_+bQ4 zaO<=~x7?b{F##0R&CJ3#ZE1qm#>BqzG^NR=8B;QPh7OT}51~R-ssRE60RRC4fq?*( zs%{bWYKx-ANXC3OYadk*b|xgl@?2WoF7u=wyn7sg5QV(hMLf8&22-`wdgl(3=0d{a zD%H^gpKnuiXmXCf1G}req4|M*64afxu1u}UsL6nh4b{-0zwBU0N$r;pUhVuj6_%b| z;++|D9NbAT;tGQs@mR%blb~7c#a(smKI?@ zvp%B@+)1S+hsBqLox8N~MEz{&(v0jgfkqw>5;GQ+08e$a<#_@@0MP4Y2M{~i1MA#x zOOL~c&UV(t6d_LMPaEh3_=FnZ#n$5pvs70CAJp0V|3I-;9ANjXk@M5We}w&no$4m; z$pS$Drq3K~fdd>|Rt0J%aPQU=w{$4?%23fQgCS((-9I?E*3v<<9GdD4_1fRf7oVCQ z6|YDfy_;iOt?ksIuBllG0zgg(&Zv*Ty7Pkq$TMOTcfx;@0`uJI8t&?jgv4o^oPTK_ zP93F?21FZu{AoZTy!S?=+&O#bi%Aefoo8B+hB*R2K`c)G*^r3o+(m=R>yKlNL=U?*N-L4NhtAFS(rd;edexK>+Roc*l5!1eeSb!19#biHMZR!!od?jgH`Kb>w%687GkutJnIO6oO#nY%JBk00O>_vE*8v_P(ZeM zyg1-iXi(EHbBv5C4uMLFyUg%pG)A8XeImB`MyyvOj2`RL1x=`fYG?MQv8#^3@9%x^ z!va7r##ufX=mK*A@81nDOXwG=jKS!Mks0{(q_+)5_cTxgUJ9@&6s`anfHIu5fuH0; zf)t=Vi;POuOB0>6lS5QhO; z8qBI0RM83|U-=XI+xdFHUJ40B(Z7#+LIL#}|29=c>WC12&1r>)F`kV&6u0I8 zb>ybJBs6_$^aUkav=3ux7hJ5O5vroQ!O@+4A`#Z~ci3l%0XPTz=c+>jLIJV=4ZCl+brIt;Q0bd|4=E zh37lQ64&|$`u_T>xj@1Ber<_56JlQiLIBxfv-kO(!4+vZ^Q({ISY>$x%$v3bG!^DD zb$^Q_#GxdZIfj+0i zZ9xe&&HxrlgMp<(vyQfEK4pN=vaC{HV-MVa$Q{tL6 zL?N0-7uT#hjhlbegc_)qd30=sxBSuSziDRPcnsC+37-jpSvm3q=&7Y4G};j%~f>`rI>+YHBU3><<%IgBHL2e-ASSZm_7>!echHJ-^o@f1$iY;SY ztM*PJi>)h?d*!9U=F%%`y#B;uL&16#k~Y0tc1xjS9Jm=iDC4@!Tj_LVzu+u>WO|c) zXPBf_f}$_JUJo)=7K<$c0|5X50)hbn0F-b7@t;+-p{YNjS&>q9It?Y)?UrWUSrDj- zK4^n4RCIcMPv5)je&kC8g#beC;+E z6=-eYf3QSK)&qp2<$NE_zv`dY_f%+&m$QdJ6DXHWX;rxQQ?Y zL&+~b_4ga;Uh|~u8zvI=3*Ar&m%6;lLUNuh<@WN{{Cx`BXIX(B!EB#aM@+aU_!F2* zx}ySOhbBRceZc3N6K45(f;IPr#R7qW0M3r;XD_EYQ${kZG;N+Ku_UN)Zy?pAVN0m& zYA`H$SG+nCp0}x}o@2CzbPRz&Vr(c}=L2s@oUCH?fxk*;6}=qtllXPUl=t;vC5mIF ziVzRy#it=X#{7r|9##KAv51P>5KbR$UJ=p1kT9H%mG^%+S;nEJW|w|VqdgRWk;|IF;uVzx=Us)7S@@q9;D7mLNsCe1$ zu243FUmQyg-sUPxkvx{mIbz`f_x1kTYZk=>y%P2!qwD^xhF^xi+Z5WBY4q`-rz`<= zMiwMNLdAU=)pC$m@8N^|D^(%LBuN7WCjxsX zzp129qfJc^NJNH`*)Emv{flUeCfEfOqnTWr2E)wZS-SyI9bO%!YE3Z6Wk?A?hm$dv z0)c@5$$25edjRv&-KHFP=KBZ^4M#tSU?!OK<-l6n5Z?;{{}_z z^-I#1z*_<7Xcx0=%X81)sT@c$_WkL!x>!LiJK3NA=+{5VD=Ni&_`HBA%D z=};1)H_4@&&##(e#3}oYGFnPyxM8rWON)o7-k~eo#&(TY-JQu%8rzNZ9%>*c_?52{ zx`I6c4rDa{T-+SDvj8!c+k0qa)nJcgxH5X?874{CydYOXO$IkaO98_A%XeNWTH)MN Geiue|he5Fb literal 1191 zcmV;Y1X%kpf&`-i0RRGm0RaHQpugMt&u|7rv!C9LJ=rhBH$C@fYh{Ath`JqsrwVq? zA;rGwdz;vW#=#sA1YEwE5j|QuiSkR15=5=(@4UbWOLeF_S#o-F8XALLbhnX29W0$0 z`^6U}4UEEJE#HKhq!Uh&FZ9AsCOsK;yP?!b@<$f99GRjI+k0MRvI+F2GfIq-0(2*< zI@+{M1%IXd(F9**b0+8=WCc3!R90Z=+`AS3+BF!K@+u=)cS!#laK$+W*UPbkBh$%E z9O&R=BhkV~W3pb90gAIAV!eeFdnK&`0|5X50)hbn0KrYIAk0gtB;cu1_*7~DLp$s41j1L{dy$8u z>Q{6SrHuFJ5=4!AZ6f&-rB0VNk}EF%GnIau0>!zBGX8BCm(}Gomw{5otF4q+j_!p^p1sm3^l)5OV-`8fG^47KzM3=dOYqWQN}Mx08R?P zYG(QI^V0Ya2D(mOHZ6n3J@*&>6Q$zUudW;ASZ zQzH5(Vi)P&Q`Izs^HP*fY*{R7YiqEtv!@=|O8tlwC^M*Cwj0|J48 z0LvBOMMw2v^dO~mza7xFv4n50Qe?_on9muo``SJVw9twDxz;$tm3C(+A5JQ?3KbZA zjJgHmx*IBX4Ilw`JwQ-@w86>Eta4z4TXD9^xK10mFm*b9*FGd6pGoDEYM0?EA=1$? zAh{7-VIk);QUektIB7B1=h0D7V+h(3j{<>!Ay@B-IXxJRi!d!JY9)Q_y>BYaL$g&; zytn>PR~(ZYzYOl@OGA*<38Cgn$53>6_^#wDST1{Xw-R%AJ5f%kWK&JFV-I!P2AUax z?0^i4+Xou6@fpn6>Md z0)c=X@A}4A#y*Q%XsE;Fq)6I8SgLZZ^7^m458-?+{^(mFM#e>F-0j)c{*7c|js3Dusa$NJOJF%*s<_@CX`P5&9Zxl{ zJ26krm{pSK35pUk>#y4J{_H2XK9P;o*ErV#fq*qDV<*E0RC9D5w-*D^YaVVcH?W@L z7s;4%??z;ZXmnf~khf-nE#R3RkTMyTDHf{l6Nty%m{M|z$?N~GZfa&6?#vD#hY5(3Q9a4T0*tGe(Ft6 zO;-?^5C%F<@^3Rfw--TTl+taOmOr~GdK)(nn7CLdWf(~;M^tEIe?>)9rZ-b(z&fld zu889x)h3mjT0%dJ!;@?nu1Q}VBR?b1nZz0*#bG94#Z3bgL~?FWE@IY(@jN{;`7(o{ zk)wd0e$5u#>W%b=p)(AbeCif8b+o2QveZ8Q_d3*qspKaLd#lf7_DBBS*~i#_?zj*_ zY#4krTfaewD+KTqj$y=qSBjI+r7Z%yrIBMOoytmj7kDr9c(l(O2)H z(fIxJS>u6Y1yFn6T~RR!FQc42Rn7XA9nD&{}+Bgme)E^6agbGAfFjP}bT-BtyT7xpS zxsvhyPAV4QD0s~sNH*~v9>nTJ5jfF1m^P4v%#zf_80||MDIovH9!TcNL!#P3aPoIZ zrD;~Rv6q+LSH0Ws>Z(Q93Cwwx^&folDdkYQQ?+^7Y#taZk_2zIcS_p$=-WR-r6k5^ z`Q9AZ&09&?%KTR0B5w;@o)9zIzM2QlSD_}WCD-!l z=*&)@iyn%}yS&`Pwxu?aBZ(YaFjVnGXPKfW_DrQF5?pMdqkHNWX5I6Wa{4!78X2NY z^fFYS(5%VL+Descke}>5rf%Lsv&*$)X*m>Xo*fzrh`@sK{ zemvF))83vU&aL&bKmY35mspKe{Zr~lRP&i}(_1>x{uu4m91s8-#1ZVjIV0-+@V>Cp z=oV(3oX&I}#5@ks0)hbn0NJo+7ZDZk6%w7HK)pDrqnnD06;`H2brD5^6aV%{S2R;b zO0q;pP8kx(Fxi9z zv^x<^nL(3>%JYV8GzTn1mGqo~57!}DNopBdOJZal(F8NW&GS_2j?u$hC9$sE)*UC| zA(ehgwlp8Sdetsc#gGHoeeyI62?enpCT;GDyn{fg!yf2{tK6r8L8-{j zWmujn)3R`}w^3W~oc9wnI&2gHljAvYx5(wc_y3pY_!v?j2cFQbtFD7qJcK>82lu++ z2de2Nx*CS`bCQ$dodSXZ0RX^aac1&D2nLUw8}i_%3EE0IGhLYo;R|OTMFZ(f_&3 z)ft!ypL4v4lJZ)sp$V*V0^U+|g-3jybt01u;0}_;i%@h4Im)VfvRVj}+PVQd z$%(#`JCzh771fa_2a++OL8ToUE)gBT+4vmT>p>VRShbNOdsO4khw^!!{2Kbjv34O8 zVDIg^UzX1Uv-cNx5VZn=0RaG^TDSp5|IEq3*QX1%b;f_^t)z4Jn;izN`>1p*n4Z3i zp<;ey?=s!vDVlM7g7{3Vv#|!aa!mnX z*x&1n=?C+SV=c!dei68K2K@qr)4OY<)Dv%4aJ+vNE5e*fVy$mik94^DjEy2B9~@7A zmppG1hUeC>4Du?hE(4tcf&l;o({o(SzVb|$)uyf04BMt^ExMrK9 zE-?$113*7OqH)9vfKDQRYuM`}(k6dDckd>_F&ZQByZ zZ6t*p4!v{Z>1O)Sga0~~zQHQlYQTPkB^jYVtKTUnRr&GVFg2W8o zkC0CEd$eLG7elaf8bk2{f&l;@Cv3%63(Sp{p0(|C36aQ)h~D9#vOmntkZ~slnhPqP z6^mvyz&YRPtNZy^tO*^&V>3Llc6E}l^rWx0uE(NM@%POqx>og2Vz+-3TX)f|WK3V< z!nA_Z_{F1d%Ct3r+XfP;ggZxUsXu(1vjtVTPYM7{dm@IOaK!EjU2_*}4*?d{?bs1- z-QR<+bsFyn0!&rwoJU2XzvSHG@Fz;@DX2p|sGURX?(2q`7gHk)MU)+TrVd!Yy-=>{ z*`PoHfRz&pcdaO8O!1<8c1fQ(aSAj|)#}u4Ep0;5M@#wpmeJ?wh-{#-F%}3)vYB3 ztJJUoqYbWSsq{2`FhC1&(maox?BB8At*_qHegN_Cm(UerlhGFqSp+Cz&}#6X`{ z2H3(|N2wGExlD97fXsOeCn^W`4Pn++s+M#D>;O(~wfl~y;qgj?b^u`WqW``cC|ig? z96y!M7XS2>*B=ru_+Qy_9la*KLK^5a-5uR~wh=@#U7Tn=6AH}gihl`NTe>q(s6__@ z%!kaMhJ)^ct&_f>W0CD_-U+Y4I0SM3pkvJ2 zC5#@2b&4ibCx^XoK}a?;7P^WLB95^r%-L{Z^TI${%`T)LB-5txgX;UR9*9tfG zp0JoMr}gZ3&ElIoiQP({zW|?|Q29=N}D%WseeY63jXE#yASA&jVGam|+W!jT0{up!{AH7z;XMwF|1&oLlT zIf-10|5X50)heo0Ic&e?J7A6sOJ1oEf|dfVdPFl7nV#Utbk!IcE+x| zwzL2mzN#?8R)=NF$soY8eCHCB3H|LyF9zTm1EmhU@HP^xA!jo7)<0XT9bP4MXZ}Tg z9vpLn130B*c(tPYd~`tvpU+SK#>$+(${mFip2Fs^tL+p5xrw4e0R9cryNig*Qm99AT2>K`J_ZtV`sYF+WVfz|JC5a< z32|_d#wA0pmA>Jqt>Mq+?{md{55I*UK^tnI4QyYb3M%J`W?RySWV>v6a0W~ptFc#8 z2+k-`_?PuZljI(Z0ycu)f%7=#+3so6_4~q}&izudsVk7dFnzrcH(x^A=H{OU7it9{ zgYY)1WTAuDc>i}P!P>*jVZ-o?Z5mw5N5SWmc^m+(>O|VI_8zn(F&6&QuB}9w1$fl; zoTz0hq;ReN$wnV{J0^Im88if^GkC^Y=)-Cng#lZ*eux-L-x(rbUK01LbXkwx0H)&siZdBsGY zPMq(uI&?)?UC^J;$pV4_0RaDqB(do1D>>Gq+(e`t>wW2jmbau)pXl!~H>zdxJy}70 zFQJ@~IHF5WD^efq<~`Y-ZapdE=Lvf^%`bxIV>8_ zpi17`dW!em{S$qPsQ zzinB>N&dd23n`lgx*LKC_VcD7mz0m(-cw6)yAq_15GEpUr!x{xm4s%+;_{m6IW3%P zUSyYXejLf2KjE=QU6-!scDoFt6`f&l+0&(85wU;4{*%q6qPV8GmC(8`8*ZrUuiq8z;aBT#Uur zDKGrMBOFWEVn`AV4MGdUv>t%IN_x}+7WbM=`KGAls{0t4O86`nN}ZmdaAZh%0M=q= z(+Zh=EN$fYA?`prE2p~xf&l+H9=lOdxG5_)MY;GlVN!q)iERlQWT;`HHkO%rFj6$8Eo2%|Sb z{rF3nAU+bOCGW7&gx08o=COjKnG9OXBv*(*XA_7DIoHpF9f_YHl z6Rf__Wk*KocnrQNJq$tmKXqr5#tV-L-)jzV4sP&t6|KgmadNx7o=1RY_L`XR=my%F zxJ*{_68OcU5|vB!271W?f&l>lq7j)r+-H%^f<*}JSZVtPV&|7V_uzNj4B0wPZU%(I z!-#xJMnItAM}A*#OO?#rh~@QEQ+PsjlRKVqeTyM#dxk0l02_r9_ zBsL~(g-PWYbR%PVYD*$Dua&VxhCu}x`T7lBNtJ2|fQF1p@+xlc!^9lFEq)(oD{-AG zMv3>^$8)&&Cqm9W>bB2ITLy^6lMzc_-U;tIQITU0U)4vV zu^PNP`(&Igf`#YYx+c>R;XC3`YZg5g(tGs#J^3oGTnXfccDQZ1E2^{1-{SxQU()Tj Tbx&XXcZMQG44N=;lHrQ{Y;S%h diff --git a/ssl/test/axTLS.key_4096.pem b/ssl/test/axTLS.key_4096.pem index 9929467f4..362e77724 100644 --- a/ssl/test/axTLS.key_4096.pem +++ b/ssl/test/axTLS.key_4096.pem @@ -1,51 +1,51 @@ -----BEGIN RSA PRIVATE KEY----- -MIIJKQIBAAKCAgEA/Ce0mV0qytAwDPrjXRBlUh2gdKs2thDw3N18owXVrSUFq9Sw -AaMNrmep9DR9MEALcdMm3GCEJ7sOOiEQcqTz25di36WJDe+jo1z5nD2XZsPIsp9+ -k51Vz+W3B4vsXJAgzV+XZbmv9L0598VEwkpeI3Uc9et8ZhGvDPoHZyBQG1KAj6h3 -AKZ1+NthrhajxlrndQZ5Du/R5DSUQOBcCHHdzZgihdfF97Yn/kp1mele1ElZMlqg -BtpDi1TEQJ9XBtjCW0epFAm5THQ3gMx5DCcqB/cNYdZWqpZ0AuwATm61+46m4fFK -g3YAYPOi/74aKFuIQBw/lc8W//SV1x8SL/hf2XIdvSa9QhroNN0d3Xu2EUQzXZxo -PRMKzOqKfwlZW7ozT6hFBwPMh8yfhoPugq2TvqBjke1s3gmvwTgEcf+gY97qXiZC -X5bh/ehmnZ7vIblYFUD2yMlsKaXGJYweh3WKJlQnh71wQUg2Mxa6ig8ijrEozNlw -YfPCQFrNLqQfJOwdx90dy7hpUyUn1wo39p6wmC6n9ex4zeKbO4ndSp+/AJ+d5Qp8 -zoMzwneYV9LBQG8ry4uwzDkSWKb/WghsEbQ9O3sGIuI13SlT/B64v3bLb5AHagI8 -zS3kPsshjKhkcc2W9MKRBU2wIeCsNS052kaUq3rPMSBROrALmLk3en/Dq48CAwEA -AQKCAgEArPMy7So5Cqjm/FAtGI0BYeRORReWTCSsgGEudsauu7a0ABq+qjDDVodl -y8kgwLJ85xKUCf3tRy8G4BoDpQ688DYSrCFnMvbWP1urHV4ldWf+RX4eHHODAzil -ZHi1ovt8dEEHn89P/8a2dtqIgdbuYNWYCpj9Vyjz7yujXjmMmGDrKx26meiS7CDV -C8odhRSewuawq+0UArmJokIA/g3Tu4uIylKoR3JaVhGOPgYSc/rnQiFkt66HO47l -mQlxcJHGJUOulb7hqK3hz+bvc8V9D7+FH0EbaqANbF+hCirniWZb0odku2x5cAZM -G6uxV1MIzihR+Jf1R5PkHowCNoLegfM45tnuadP1+8Kezv1SsqkrkMEwfb0QN19C -2+bmnwYXagUgg/A2q2Shg9h4/3cpwdrDzGHD8IttGlzLR8HnlHkcAK3qRNqy9h60 -JDEW/tOurUSZBXjU9ZyoZSukcK3+yUjCDWS92wMOBlUQGh4/HCOOizahe6lhn2nT -+jkBvl38c+7GBKR0VyCisFi++FukMBbyU/hNNFByZxOj0b/+YVYI0qwM5oDzLhJH -69/VhxMx0xVt9/kOOO3yhdGjKCZztPZZm5mg2OzzXmf4im+hPSg0/OrdXrVNk4v/ -w7ouUQHSa3+rAAu8BJFF2rTWA7rjecVEnk6c77I6dEVYXdCfz8kCggEBAP+IJLHo -7Cs51qPcRKQc633phJa3pFGf6O8xN6pl8z1ZQX0voZyROKJLTytSH+zmPdmggUeg -7CRoV8BKY49YiOxO2Kx8BPfftItS9yvA3O9ztcdzQa72nYusMWwvj0yFU8DbYfnx -yYw59F/1pdPKFN83Sj4MJAOb4nAxBP1GiZvsPAgcTpf/197NLNHwUDdk/TXDtTLa -lx4uTn/SJDQuvsCCLBKyx7FdN5NPRN2kIKUWZLd7HRu2EhcSlATwf4TUPZz7atKN -2FD0svErpPOAspNPtnNj3RgeunGVqS2oi/XueuveNNCYLkcV8/UaZm85LBrPoEre -23qK9/ZN0SD534sCggEBAPyd+nD71pScrM0TI4Lc3jMNUKeZj3sT5rlhlkWlARhQ -WPEWYYg5vs3zDiRpG4Xy3n9ey+M6Tuw+/XpcJZxhrLYFOqparxXPP4qc+3EvtzpF -OskLR/2/bVnESf6+pQspmwW6G4IJ9vOmIJeUj9zeU0txuxKkjhAmInCnMxJOlYRm -xeLymuo5LZxrXmSXcX4cyZ0/4bF2L3IE5vH7ffdWXWYzW9wP7M4sFp+0iKjHuhC1 -gB6Qg0Mp0TVNUt0ZEelFLEJdA2lbbZ5yHhNXuhOxW/l3ASSe9tjTpy7yBSwBOpFG -l7QGISfJVEFfjyn7yWBYj5LDGnitlP4TtN8zyy6cJI0CggEAPRwY8ncqq7e8Thmq -TLkh1E3ZSJYIdQDSGwnhLx4MirpiwAZ5FtFgAugRueF9AxGY7wfEgxXIA3j0q2be -4nQg4qqEhNNv+LuGGN+xfsQz0gwRB+7XYXlW+gUnGKFTGtCz0+ZjSvv44FEn0R8V -Fk44qZ02YxpSLo7EG2KNt+h7lk9rl+D1JsKnpH/a3SYkeOrs50OzfMLr6urWGRlv -UQ9wzOcUlTAuM4uAc/k8FelfaTuuwHZv4qWrM9tcjMXbKS/8wCMcS9hiSBINDUIL -w7QegL5KetQCFveaTPmmqOWq+xiaSvgsF0qdnqBwZEh5ANZiZtMKmX0sbeT4Ie5A -OiunuwKCAQBlSlrvDqu9rwzCtdfZUwJtaftbGIGlkhdDYdPFXSIRQ7ZGBPlai/zr -y3dyNgrpLLb2T2ZlWC3pIGC2vVf/WlLMMVCSmgX2MsGBrOxNOBq57KRjlHhrUGRi -SAh7cqnuzeHw6+y3uZMhow0Semks4KB5ccLW+NBVvVS14vThdE0TZ7oVA74GCKM3 -Qv34S5kgPh7BRKoUZBUmHL0VbgfWMvUEU7eTh3cmPBteMh9RvbPnmz8iAkP/nDbc -roJ5UOITrL7QZUdG6XgMvik9DEH6P3Vnk8YLjwnfaw5wDm7wdBWtxqZxcru8nkeA -ZvaamPDoBtqauExW8xL4xaISlUv1BnrJAoIBAQCiEZk93GeRzYJFCO1YafsGYueX -Pffgd9wM2TpObgaEw8OIfEpGQKDiR35fb0uVzNyI5fVU5D5tP0b3LfvtQXV12ryQ -sVTA5YJcb8mRuUGy/AkjL54kNiZthUnlGHQjY3lqSyI1r5WxRIZBBRn5+g1eSZVq -CYCGjEryKm7vw8Qcvy1+H2crcZ0rRyLTcfFCr1ZXlyEZu48ScOtxcIDHc7j4J0LO -Peq2z0tbBojGkxFLX94J7zpRkWMPX9VHorEavDv7ZJwtgoXn3Lom0xHhO+JQaxY9 -FtJ79Ps9+SquXAnkhna4bbkrqrPM3+MAAV/S7bd1T1/8d4YiRQyaMHGS4Yr8 +MIIJKAIBAAKCAgEAo5gChsj+wQBrSNjdaeHZQFNBsrMsgQXT8+5U56Gq2ddnVP7s +s9O6SzyKNab45c3+68uDRhlAOk62O63smiDpfc8OvV+cYJkH0HLNSpUMILc61jdW +WnxrHRvHQm5Drlkc/s+VCf7YMNybOzKaigddZ1qMI5vtNd1kK3jx9q718T/Wmnj5 +nSwpSK5uV3+KGbkiBubBJtFatsfNkncxq8wIcwrAK8JQMxTWzhV6T4PFm1rcCko8 +HlpCtb1+6k1PTVcQmRAGOk7ybzM+txdBYpTSbZiWP7spehs3D5i4WChlGEksR1Ro +Y39FRVSmN1NnwDqsKq6I4yDVJpWbWkI/jMOTbBiuSV8dIz8j0JnEGiLFYSZhxU0D +FERyblAuYtaG8Tw9Mvkyg6GRo4Cffs0W3OqN9IehMwyZfOoWNXW0pkmy1D7+9zrU +gqnkJwp7q89l9kf+3tnH2H/uuBBCbBh8NFu/QYgrBPAUjmHEf1eKk9ClLQK85T9J +6aGpJVj0x1Vm2/vlars5qBx3TSrC+BKg2FVQoTKbbN5ySS3a6RyWWiGkuvkfvFFK +WTW9d8lpeH1ivXPGvUVZ5LOW/2W7pUAV3tFX76LR+P30WeOBYwVQe99dUTEJL6Oc +PVXN+pYdzVquKRJnULU5pMvd4QPILRHI99HAIVaTiidRtpRsmAR6CTVRCQECAwEA +AQKCAgBIbWlY8S3QlvXop5LHaOU9VF721dqzOLhQ+8h9UJcKoRIvkDmNmASXgLMT +89uoKl5dWJnC9DT6W5TUsTjaOA4H1B8LeoQKRFYwVFNNXNWkulqDMra5kvH9TioW +4Ch4zR1INvEeHsTqRRE40TuYNpCEzJLUxRjtSxopIP/HHkjmyUOi2kJw8ndIpWlW +tbGXl95Xvdvv6qpF2AnMeZb1H3zyKeVQulO1edlsHhgrkgRvtndK2vjo2z9DpSTG +aPneHNjNW0nWkNNGpiJy/wnEsmzDdtW2W4+ObvQepJeg+Clh6it/XQBmZJdvjX2V +awi5E4Db2K/kFsonrf68pC3sjT373RfHAEjiNY2Kspr7fgUNsFVOfyaORuWcqbzo +TMBG9vryGOfhsADISSWtJFN8FW4rjoIJ9Y0Oac95MCoMOFI82sr8VuEibwtbnhAz +2r6aB85XoSarJdfy6ejMTp6LHorJu7zcw7alNpEjiRxbMFTxRGeZoif2TKUmElxs +oaN76hZm3fOScvo3YhoZokz0MlSg0KzJzdpKlWvkoEhSr5RLHY+qlpd5sYAtf4bJ +EIH0vVrP5/B42Hnf/9g2wwP7wP+UfjzWCNPeniLOrfWyP//q2pdYjVX9U+pIVPOZ +cdNbOtH+GO3VHBAAG8QR7L85I+r+8L6w0ugWZp2cznQexDwO0QKCAQEA2bBmFxEV +8BUSnaFAvTipo5uKixVWpkV1EUWCE//2R1c0U0blW3KocefURIFHGYmu+XdmnI2H +MTDB9Nh0I6oqceXiRKeyvTppudIASrJER04ZEskw2YQEtDsRTZlBk4fK84ZtNAcs +RJX0nIIP1yFaSWoZWktiZB3RBDPBzfNU647Rw1wlsa7d1h0n4SGVfkq2NB+85Uqu +y2xAR1d61S5SxZAD2H3yNAwJBbEeJm3uiryDQKnDHuiGq9yngkGpyM5lWJ4q07Jw +sbdRW++c9xM0OmwUAZPjOXG3yOW/9/+X5/gYUh8HntCuq66DVjyEPbQH97rhB6rp +JroahvRzkpPinQKCAQEAwGJxZvJCCAaPnBvy4KcJ2ko5M12l7I91x5UDylAahexY +u4TyxeRSm+UcaYoV0BRG2usW2ImioxP1FNr+GSp0M3bOxE/dAebi061rpiMdS76j +ddH/uczVGZgKn3O8iZLyWquhCaxyAt5SdIVHfJ11IpMN4A6SxotQdAk6sjKjYXRQ +WgR8a+OG9vgrcADHV3GaBcQBZ3NRgkU1YddFyauTx5QPaWJSFmJcWn6HyNN2v3hG +HeskNeOyWgiT2roBO8mJvpM7lRQiFdWRKAeSMaJBpR0aLhEdwNn4HNjrQRgrWLWR +I3tU48+H8nmf/Br6xbF2IRRg7+26X5bPA7P3F3gQtQKCAQEAoVq4AUb/zMnB16cL +tnXGf+etpHP3mx0GrfuodCyYnr6LoWJ+ZO8y3eMpmnF8gvhkArM3ErlwyMxMJ7E9 +PKZH+c6cjakDunEOptZ6suM56uR/f0YzeDb7yZ+yrqL3UWQo0aMFVLgwXtIL0uow +1ZP6OUp0alJQJsdXA1ddwssnWcatwrGNmwtzkN5hjeT3yvmT3kTcHdTihRPC/V5h +RJyma5vYzeJk4aE+GsLzByca1iju3MI4R7OxBrhyTQFg2N/rjOkH84xjLcckfhG4 +dgb9AoTTu2uj1BNvV3C8fxUrwpxJYq1vV490uPqMjSIkHxxPf5c8bxOG59awDPIq +rC4DnQKCAQAE03Nczb7yTJfVpq3VDNumai49J6A96utdclOCA7hmm6MuMQuWA0A/ +QOQRkbEyYw/T9gnArNMznBCN0WCGaRY5JEXTjt1QauZNwQ/uPvtBJysajYYItyax +WasKjPCx0snZlGyZvYWupL0UxzMf4SNLFr1GXZc4+82s235pcfO/Qhex6mLkofSE +xXzxdlOJ0gO3GU+ftLjat7m7Fpddk7xFSWWJkznT7eu7KWlmlEdqTi4UGg3yfB/B +Om3bEsdtJIUcDr1z4+lm+tCFXItCS3uyFKTPewZwDAe5UYe1PlH4C7X0WeerP019 +u6dTv6mCxAzej5BO9Hu0YigXQ7BzGkPxAoIBAB8nbMVXC8yNlp617XQJkciLiN7h +oLI/zM2QcScGmgsqnhWLZjXAOd/pq/v5V6wJHcRjMzyxdnWSsPSkr7aux6JS8ffN +J7pW9VBit38UW3fRrWRMX+PCtILT+MWjb8q0NYDbBhKphDtHbKk/fJuzBVW5TwoA +TXsihp5wxO4JXXMXaw8BFtXt2BFv3d+Dr3Ua7wcCTFXrnEdFor/k3OPwJ0rqKahD +PaidQ+zu64aZF1MjDEWUHXumDli/vVCu6dmgQAGAlRMKd60oZUzxonx2SZ85cQo0 +TdXq1LOweaGRYe1RqUWGdcLX2BZI0EZ9L+aNzzFnSVbhnHx0sMKpOp8SlAM= -----END RSA PRIVATE KEY----- diff --git a/ssl/test/axTLS.key_512 b/ssl/test/axTLS.key_512 index 7ae50f23bdc90e48f165aff330220508a99699f5..3fc8a7872d1833a499188a99d980c4a73679acff 100644 GIT binary patch literal 319 zcmV-F0l@w+f&n`M0RRF)0LaQ+PP?|aIqFW!gl=!;cx+KRRTPd{I+q%^`tsdqZ6z+M z-dVxk@sQ$w)Z?*x$#qjAkjc@UZ`v8Z(6{b%7XkwT009C(Bst!D#sWcFv72SQj_^T7 zXvBW;y0f$ejvbTq0=-X(kFxf;{u7oOE|QFS6l&D}EzGq60wDnI zFPX;3E+?;+$;W#Q(q+p&nle)|SS{22GE+S_!{JE+ApqCT#;#n=(;-3RdDv>7>(4%b zN37Z%B2Gz9)?Bpd3SR;sIWvz>u;qNbYmXc34t}@Up13nx&75VeB7%Z}5;A3(0wDmf z{LoD2rY{4?_|0 Rj8E9Tl@FUXC?H~j_`9{Hm*W5c literal 321 zcmV-H0lxk)f&o1O0RRF)0MR=zU#S5?J%(*^zCdnK!AXBtb)hXb<-t7_Lcx{!|rfVZ|0=xRXKgPd)!Gy#fOP009C)0Fimb?T$65*W6;Z_#YNk zQ@#a*O7BqLt*OZgemVyg$o&?(z~q?GMVVlAY-DAL#~wAJ%@hSVITaeX4+WM10RkZa z=2Ex*d>@xxG0k=x#?fIqh)t}0wDn9_HXM@#5)1QLVZv(dI{VJ z<#zME>JR1d(>*U^;{HF#AygqJ2JGkYa5*N@$(u= Tmj7@iAR3)zxTTMr$9H6O@syE# diff --git a/ssl/test/axTLS.key_512.pem b/ssl/test/axTLS.key_512.pem index 1e2fb41f8..fed6d246d 100644 --- a/ssl/test/axTLS.key_512.pem +++ b/ssl/test/axTLS.key_512.pem @@ -1,9 +1,9 @@ -----BEGIN RSA PRIVATE KEY----- -MIIBPQIBAAJBANE7MF+pAUI9hm1yvkBuUcFJf1d1oS025cE9DyAa0SNt+nTSPiOw -cPygat7sQYiE/lQVa2HFFmK4k0HxTz3/Lr0CAwEAAQJBAJF5xO2ONajX3GK2+B8W -VVO+BYNK71DfranJCX46BxXI/Ra7wOSY0UWZYHVsZGWJxx41os0UBTg5FRq4DwWW -AQECIQDo69eo39iQqjwhpAQxatMh2CWYT7gokyu56V+5o2V3fQIhAOX2b+tQxDsB -w0J9UDN6CdwI5XbzveoP5fHTPS9j4rhBAiEA3c+y6Zx6dZHYf8TdRV5QwDtB2iGY -4/L7Qimvwm6Lc1UCIQDDXWrVsocTTjsReJ6zLOHFcjVnqklU2W7T1E8tvKE3QQIh -AMRpCFM7MrS2axuc8/HzGkqW/3AlIBqdZbilj5zHd2R0 +MIIBOwIBAAJBAMjKXU67trg56k7LhG5v5XhsUTpVFI5ZOpcat/ry3WhtJS6q3lnB +3vGQ4n/U47F7yXVTIpDJ0Zxv2hm/0LfudBcCAwEAAQJAJDnee8YCQVqxm2W8jvBB +RmjEfvG6s7QFjh2T9AK9T4mPsva55HuPnRee1WgkIVFLCB2wy+xeKqYUatT/Lcy1 +AQIhAO4vmcbILievlsnHew3SZcs+mjJTMlgt0/0yUz03w+FJAiEA187GrlzN0yFB +5HnYap/rzz6AR6zaHSJOSU/WXLTpCl8CIDkzj0+w5Xy8a48b7A5+t9meuDNbzZxl +rSKCgoESMmWZAiEAsPzQTOenlePMmoijSK7nQgxMQHwuVX5xHgbwEw/7n5kCIQDp +i1Gb2CDHu79/fL6kcQ9DEfGMT9i9lQ+bNiggYoL4uw== -----END RSA PRIVATE KEY----- diff --git a/ssl/test/axTLS.key_aes128.pem b/ssl/test/axTLS.key_aes128.pem index 8961bd9a5..79a46ae2d 100644 --- a/ssl/test/axTLS.key_aes128.pem +++ b/ssl/test/axTLS.key_aes128.pem @@ -1,12 +1,12 @@ -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED -DEK-Info: AES-128-CBC,B3A0D2BCEF4DE916D0BBA30A6885251B +DEK-Info: AES-128-CBC,ECA1836F07770828A77072CB8E75B461 -v8y74AGReaPLmDt6O8wir6hX1Ze8K4fVNkrLqfDMdW5E7jBXKO8riCMNmSjQ9fyh -eTicej93+8krcIvSXKW18TdO+EWezQevgnLrAZQWaNPH2j4B+K5gm701uiiKFKVa -1zngAOByePYlN6z4JLbiCyJRhxSo5zCaUYkKC2eGh8mlE64QmokPSCAj0wcCDzGh -hdhBg1vm0GmaQwIDVn+8zMfahscXVMtBmyQf5YP4PQW2nqOt7aZHjBNdg9qnBpGw -b6YuY7eZ4FgQvYcsNCi34NroJb9pkTrrF2F9Meb6+3So7jtMFG/YaJdCuXtf01g/ -Qm+XA5pJUtIUr/hLQjhkaOVUtXv/k0o/MR4k5CbAmboLt6YHf5V8+01vk0bvv5dI -70pVdXMmx26xDZOGmjYzd93PWc+75jak3GN2fbWryQs= +IEKSJV5xp91M43nqeO3tWV42uXhRuQq1QYlwHNTJoJ+P/+Pw2g6DODFU2xcWoM89 +/QHcZIjC+Er4GM/IcRWI307XWexpxd3SSsvDd1D08HU6DyPts7Yb9zy0bwzDfS1g +wDhifACXUEYnpiTCAbO8Pni+4TMV4tQ25Iugis8IfUiBtqfsEAo/tOHbTIRTWUNN +yh7LS+7TKU0GuvEUP6uoxn0i1tDXtP9vaqgkO+DNFgi8A/Pm98qdTvLtp8mNHlJx +kX+U3+9yxm+HlwtjhU2DgHxBXq8eAtBW3rZj/pM7bFubSNeqbsD086hlxvom7ISa +Rpm7QhoPcrbFYy3rjs2JyQBoRvIAPXX2tYCuKh+Iylq5KztPspGIXXd3Sxv4g1tB +bQRVfmSwLNKo8rEP5vWa/DCVZl1GJoJTIR7vmQvGGkc= -----END RSA PRIVATE KEY----- diff --git a/ssl/test/axTLS.key_aes256.pem b/ssl/test/axTLS.key_aes256.pem index 7671a302f..940db84f4 100644 --- a/ssl/test/axTLS.key_aes256.pem +++ b/ssl/test/axTLS.key_aes256.pem @@ -1,12 +1,12 @@ -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED -DEK-Info: AES-256-CBC,F076229CDC2BCB3B8722E3865855B45C +DEK-Info: AES-256-CBC,22B407B6BE071AC8FEADA8834A3C0FBB -WFV9QWzr4tNmD+1OeQ7BceQg5LVQHp20Jo1Ax29lq8JTPzeObhtaU2MUHlcPKHUS -vK4FyQxJ25CyMubbnaZqCCz9pNbseFuJ1tob9UqRmXkZ8HV3snRjJRbcctD+V9x+ -Ymi1GreXoDQtMp0FtMiFjPvIYciBQnaRv2ChMAnGXNbZXCxWWA9E5S3a+yWzo+gd -wEcowL+SUac1PEDGHokhKn7nctvI9cC4hE6JmKM1sD68/U3rRPXMGqmC7umqyT5P -gjWBb1uu0iRjFC9eQUsaKPxey5Be710GFlyf/Ff/tep7RhkryIWEPvIzYCBf6rhk -3pysFgTjfiUuBYUNumjXr/q5hgdtb75788XUDxKwAoUx+m8gi0nJg35CN2nmQ054 -VJxcZlNv0wqnJ+GTTZeN6fiAhTpVtHsqHQomRSfaBiw= +a9LRlNUJ0oatOOxS4eMMNd3mJLre6llYU8JXnJVFyuNzmh99sgdAFao2xDOoszYj +ZcBUDD5OcZxDIVRNnbsCC7iDXsOdIrBseDmC/qiRouNZ8i2a6Dh7IMTrpToPxNQ6 +rfDC1pEf2yUtbK8fefzIKzkXz84igCGrqLCIz1aqW+xjOOoTfXXIZj/LoYueLzag +i8/nasxFQqDFEFskH38dEOMTwiKs1xZh6cUA0sQo8l4IYiwjAsAqPMiNiOdBA6sD +9322LCQwPqqU7ZelTXl8NCWvxX5S5yxV7KYmEV7VeSiPj4/ZlI8t13TTw+2Lu5j0 +35Rh18I5iUPsDUV8VaU3df81wQHnWamKFGUAY2imS8X7z1uUiUiycuJipZNSoAHx +3QvISza1zXCqbzs8lI8JQqja+Onope0CeeCBKBo9fuUirI8NsG6EPrnp5IxACPXl -----END RSA PRIVATE KEY----- diff --git a/ssl/test/axTLS.noname.p12 b/ssl/test/axTLS.noname.p12 index 9d27999fa053e524fa4ca893c2d13ce9ed49bb7c..a81c31348c5af16aa5c1d637e828267ce2458a9b 100644 GIT binary patch delta 1327 zcmV+~13KQ@IG6CQn}Edc>K{XEvhivIL1TQ!Rl}jJPYn87ud(l*H&hD{$)nK= zJw`1mD|#+`N-4d}z2%?df@aUrYVA5Qjbdz=N-+~5ggru>lYdT!P|nRRJR8`me9`<@ z%9nx$q$p|xoIeu z5h*H-f9Fj`+yz+M{iA%1yHd;W~@f|P^XWaLx=s5mW$MKK!f|a@pDzAvmb2{df z8s_T)St6%cIe)|2l541>IeOe2WxkACs4f1_78ZoAGr38l&H4(fo}I?j zk$xIvV;Y0#5FG@;`A^i&NHGjO^AYPkHsGtu_>86bKz|#gADJg2FiTG7BIcx!Cx5VJ zhe*|Wgyi-k1O!iQKg_knq(r0Sfyh*19Rc1xM3h`i1{ebbhkw(b<*yUhM-X8YF0WZ3 z`+MnV=e>Y-dB!iTS0Jw?{o32gb<^wOkxrJgJIaGn6q$$#Gq=#1n^X}#wtxs9tk!Lt zQ-RLoc1OUz>cli9Ep9=o*hG~;;*h_w!ez%davPz8{=ilkZwxyE!C3_cHKvgI1|I=_ z-87Rjb3i;K(2Kt>5jN}59+!4zWv`qFG?SnLMt_37UQj9ha*F~22ml0v0(;*!g%}=j zUDm>}I3f?}j%ayDL}05OKrl2RFpi-|?#iZO>q1iOe+S8s1}_OvsRP zvVSa**{E%V6!q=>$YI;NAt-7-)Dnc>6R@j2`~!^2tRmIevxE538en}iH{j&0&?!t2 zQ&IM|^}TX6<9-I*B{@;ttCHKRq)3BSb0oMNAo4#w@fPsPOZ5ecQRJ|D`3;D^A!;zo zLXdY!9FCXhf5SYkDDt9v#!fQl=66PEEq^iyO0LY(mm**94^tL7rW&NzED+@ZL4m8B z?QdEA3>A%2xBmEPQTW>$Dz_gR({j&Q zGi=%Cc85-}avWO1Q-p&W^<*ZzQ|jsKYiVu@pC)7@m^hyS>#NP6edr%ZITl~g0M4t<4!0L;*r z-El+hQ1NqauB75a?k6Ope9XAps-=$m$n!)?dw))<1o{muE97Q#^QLwrUfWAmS?~lj zqDCeGSCAG~O14sfI_>>)p8sU!@7to?kh;$0@TSXtP5Y7-E~Vo%Z@h%Ly6L4y{-FzE2Q-4M)NHTk%Q zz8+of-@mDt>M4_P1rta4WDB>6m0@eK7;$X~AJ+O_p+0~xF)$%82?hl#4g&%j1povT lKUA~Jy=Qn3gqYvQpB2qe7zr5#1PFy9$+0Bsq^be}2mt;ieue-5 delta 1327 zcmV+~1q<@K8-llhZX<0 zkiP-CZedr!O}^OGn;BmG?`TDOv=3KX$)0mXUZ})Xg1Y7#c6H%D@k}QyRdSRF1ko?= zw#Lsj`DwZ18Gm}*NM~RgJVg{PBcosWt)vumqQc7T`4Du*rF(^ zlB*Kl_o(A0yMvfV{A@)vK904H@MDSy&}OG%^+OWvW`96)Ed2jkZqa3P-Ad2E=zGxJ z|JJ1!a5(^aa^?|OQ%YnGU;ar;r&DQ5ngKg!B@B{UhnwV9TGzg!bVR`opj^7v3&)5; zG1YnlvTq~fpdG^sZ4A6T3{bZSCNE>h*7maR-moN57Q zqiy~vSoL)u zhG~Ol z#wKc>#g+Iqr_;+qzEWUN$q*Usx8ds`kH(5)cJQ0gM)BDi@5p`Mv3)0S1zC39{V7yv zI4rA6;YZT@L(;EN3Lc|*@_u?^1baS!Eg~`hglR6w3@X4e%obHwtZ2Frz6&_lh$30TKf>;la_In~m%k_-&Hajyub^k`0Oy8X_a^0fqSF}g~ z<81YW&jC(FL8mB@`06D(_<@;6RqF*kfPXv&ilSWTl{M}8Gjq~ zwr}%in!Mhz%b{%(zWmiX!7X-G<%c)&ctH;w)`m%Z=hc00%uX$hsAkf~9!&4`fEr0r~ z(pTDre=sEtfIM)LjsqXQj8gUO|9_Tnmd(44NKwJBHl{N0Sg}C}klKlw?Tt5mkmdN5 zD}>|BDPR--WtjIR(u~B~KeY9CBqwunbfXF;I|}w7FyU`#7N$7N3;LGze(0K@?h~*P zs1V^f`(`oWIaWs{G7UNHO)B9>Mgp}gm~+d{BZDFAzdk`<`3Yt;iJ?V3-VpoEw5gaa zf2Om@GYd($am$l&1rtXxwu|ApG;ID@f`chs320&mjjA{>F)$%82?hl#4g&%j1povT lL75EQR*O1__}Y%Km|+mWIzn~41PCh;SJ5PVg&LNQUoKQMv;I|2a!0zm-C%3V&owzxU! zPRoRDZ{>JwQ94x=j#)aF8n^oL-DqtkE~?&H!QSzZ;(yfRv3tpNQzDSb(VTDE8NblC z?sOLd0|5X50zf1=-h0LZL0Yk!WxS5?K}KlAe(}1qv;~eGlk@_;Pl=DR_POMHkDV8u z)o3IkQA-FNu*>XTDy9@_)c-BawE+Sl0PZiD#>g%wua?QjdkxZM%RZViQ!-dB)BQ42 zJvYPQNdh4N*UrYST+P!VLF9SZYM<-RK7dE8+8rWJNl(^XwCM_80w6gvk591We7tLq z8|)5#x7nV!Gh5A^WvwEDf`Jk;WtjpY0I>YfOy{SS5EaD*dWKdzkhtbq;U^J5%G*q*u9kxn>HvQVuJX)!WW#1 literal 347 zcmV-h0i^ygf&o_o0RS)!1_>&LNQUoK`?>=Jpus$0zm-LJ1}3V0YW{7 zZF0UqZc)KWe^+&(EjH!BJr5un(Iaj8bkaT}uyFjKYToQYh=l%B6>DL|7Gk)QLGe#L z|1P}(0|5X50zm+gdBp9GHK^CzVz&4n7FAQe1%pcOP~WYo$q9Zs2NlTu7Q4XYn9)U< zV0CO{Wr@cgHKNTF1vohs8n_PymH`0*Apq#>*Qnpvkg7Z(qy#Z)(;?U;m`}JUlPkID zU%8`YcYOjO0Oj^?>rliy0mDLlP&0Z7+z91%^S$a1{HF-OsY=oO*SU z*nh;`MP5+AJ3-nZnB(&MLMgApZi{nO0wDmyU24^`hZ9aa5qO@nEaAm+HD{_xRM~FR t)K4wEp*KMSAppc_2va*Uw6<#-ob&PX8cLS`a3vrbon^SCkDSMMWONLcmL~uJ diff --git a/ssl/test/axTLS.unencrypted_pem.p8 b/ssl/test/axTLS.unencrypted_pem.p8 index e07375a84..6bedafaf4 100644 --- a/ssl/test/axTLS.unencrypted_pem.p8 +++ b/ssl/test/axTLS.unencrypted_pem.p8 @@ -1,10 +1,10 @@ -----BEGIN PRIVATE KEY----- -MIIBVwIBADANBgkqhkiG9w0BAQEFAASCAUEwggE9AgEAAkEA0TswX6kBQj2GbXK+ -QG5RwUl/V3WhLTblwT0PIBrRI236dNI+I7Bw/KBq3uxBiIT+VBVrYcUWYriTQfFP -Pf8uvQIDAQABAkEAkXnE7Y41qNfcYrb4HxZVU74Fg0rvUN+tqckJfjoHFcj9FrvA -5JjRRZlgdWxkZYnHHjWizRQFODkVGrgPBZYBAQIhAOjr16jf2JCqPCGkBDFq0yHY -JZhPuCiTK7npX7mjZXd9AiEA5fZv61DEOwHDQn1QM3oJ3AjldvO96g/l8dM9L2Pi -uEECIQDdz7LpnHp1kdh/xN1FXlDAO0HaIZjj8vtCKa/CbotzVQIhAMNdatWyhxNO -OxF4nrMs4cVyNWeqSVTZbtPUTy28oTdBAiEAxGkIUzsytLZrG5zz8fMaSpb/cCUg -Gp1luKWPnMd3ZHQ= +MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEAyMpdTru2uDnqTsuE +bm/leGxROlUUjlk6lxq3+vLdaG0lLqreWcHe8ZDif9TjsXvJdVMikMnRnG/aGb/Q +t+50FwIDAQABAkAkOd57xgJBWrGbZbyO8EFGaMR+8bqztAWOHZP0Ar1PiY+y9rnk +e4+dF57VaCQhUUsIHbDL7F4qphRq1P8tzLUBAiEA7i+ZxsguJ6+Wycd7DdJlyz6a +MlMyWC3T/TJTPTfD4UkCIQDXzsauXM3TIUHkedhqn+vPPoBHrNodIk5JT9ZctOkK +XwIgOTOPT7DlfLxrjxvsDn632Z64M1vNnGWtIoKCgRIyZZkCIQCw/NBM56eV48ya +iKNIrudCDExAfC5VfnEeBvATD/ufmQIhAOmLUZvYIMe7v398vqRxD0MR8YxP2L2V +D5s2KCBigvi7 -----END PRIVATE KEY----- diff --git a/ssl/test/axTLS.withCA.p12 b/ssl/test/axTLS.withCA.p12 index ae029dee0fd45e90460d0eacd15f9be1882756ea..fb236c1271b37abe72a3d7e5c3de55aff64a706e 100644 GIT binary patch delta 1901 zcmV-z2a@=y5UCK5U4O`L3jY~zNfH7A2mpYB1Zw73<2doRO_X^F)YU@fV0&9=vf_Ch ztzm0R>pFg&`l=BK2nd->NB$~BoUue8PAVYQgn4Vp;yifNrk|9>8&a|=eY2{~<2QDn z3#{_+&Jnf(s~Zj#+KI4(w>MEbJ1MzC^d9tPMC#>{y6nVp)_?m+-}YdgnTQrP?0qmV z+L1zHnsbNI$`s@7m3B+dDT!np&ihEsESn?@wi7ulN9c1kPW50deiXykD?Bgm)D6+| zX{~iU@Q-6|6ZCU`X>@^+P{isAjWPG5(eCdEA`I)#V4idk5KPal46&S~szkx`fctPw z#s4CL>c*;{iGP&vTmlmEa3BCwNi5Z5k0)sVwef}GF0z`Q+R9HDkaz(=-fAIO-kL?x zC*Oq0g;DS*HgDm|LFqi!n9@$**KW{0cC^ZVFtf>3?MrEJGWB2U^k@!9*3E#v_r5W3 zi#eP0o(Z@**_9mgXK6t=XCchGh3~jyDC7e0{jtV z#Pi>D3rB&^=%A_{CeX}tJIuR2*Navu61-}La&}tKxSX8d27uxiU?8cqEdl|zla#+tef&~?qQh1ek8V$;85#Qm2lWeqLRYH-0d=$#&OI>qt2hrlY2g6^2d zY_fN@`*&U()*y{nvOU!&D>5WT0eSITST0o*8ixfw?|0 zsc-ob8M^C3R+1Ep2M+IV?=yuQJKw*fL;$tkb*AAOZ@R6afyUL?+146}fJ)L3HGfuv z7?6Xf(!-MvXbXJv_8j)I)`xp#)Ox|Z7LhKrGypN;{Zo=AF=&@h-Fd1ZwvfV3L6$X} zpYSULJQ<&u=TcFMwaG_x7%NlM3t&RK!i2y#C@oJuct04j)KL%1=J+o?a}h8>r?jH~ zSU_9nmZZ{LWE?QkH^gC~(8Wy9Py;G<{FB!NMt@L(Ru{~ZX2ml0v0(&1HX3WX& z$NXkS(OU>3v8zfjrWFLsg}DX)HJ>UxctUvaAUC{>?YirBM{!t2;SZ=4iX>GWnc?~9rbt?Rh#Tr=dwyIq@W zEq^AnzyLrkljAFuaT$&58=EcF_NiwG=nBvE?^(o4*rnE5tW277iP;CFx_BR1d zv}rN3NnVH$*WDrb*e_XHrq6dHF!2)YqoNN;;_VfM`0}cgnKu)dh`ktb-gfBH-dsoE(Qm8&<}Xp!C^i7JCx2{at7U4?``==mPbj^ob4Qc5RMzqbi0a5hl>x|af1p>cS&T%( z;?6G~oRczfa;LVX^QP}@h|S$A7k>(i;SmF~?u`fqFQ5%Dp$|5l6~mr__;+C-QHw=B zZ^Tl)8(towWkxfA zFd!$VT=kJ2&7|q`0?;IY?0mSE$CztJ#&22Bppfb&QEVGXMqD)#H7?79YBwd4?Q4V8 zI!X1Pixzx4d;2j=Fe3&DDuzgg_YDCF6)_eB6!~New~3WuYq1z{Z3rLM`d*L_#ct_xo(Flj7J6%}9g~1cC z(b{wOWey{+fuMV(xKGAV=!pZ+-@^y-k9t$xMmfRJ;${RY=mgxUf_j7SshF?u0b@)4 zu>4Fa-mPQlf0iQbQ-N)3L~;jeByi~vJP9h&xjNqpjLDj^+kb$|QDM~6kO^x`J=n^} zv)ZYRqaZ~&^cp|GB|La$)Y3b?OYp@QA57%LVsJB8|E$S79IJ=LoT_Z~XN>X-iW>}` zJznpT1TrSdOiaa3{mVv9*nn_?K0DkEh}Es(kz~<>LmmIm{)w3LkF=zBg$1Do*>+#x zRb(7R4wma)jelK@^!he)EXN(!hcVP)1b&Ii75;EeNPV_E(nh8atkVC-r^erCWUdoyr>Rj-I%$HAg(!Iyh5hl zOJ$>{x)lR^1-2=ChvGjlO15Gs(z^z{!?a`@$$S_!xqlc>GV3i*%_IF0*^m~&$))J@(B^&NmJW}->hzshEZm!O68f z#rd*xi_}{ybmvuDlk?}p#w;!P_FLZMON1TVs#7{*fjpKX1Wkgrnqdu z8&l?Bt^)mszFOX|q5&%J3gDzJZPC&@*U|D zI1QWTIjrjd|EQv3i(s#O!tUX+u{WLEkAKd<$ppO**M6ZTwn2Nz+~vNPa2H!^ygZlL z9fb$pQ23rKet7Jhk}@qzfU;XqcfYM%J?;pO((&k@G74iQFJ!j#1eDQZUsf=py3NK& zul#eRN1!$lmfPO$xw6Pr>wOsR^gJ|BiKQiOTA&Sp;lm^NH(LZVd9-DNUW!2z3V-8V zxiDroRo^cH&4<^?sy@;7?>!4PDCr4ejUdKCZus{r&P+8%x_Lo2?J&KbfJp{*pc95v zPsECFgB9) zm?-nu)IQW=LPG_r^^ee)lrdaFW!sv8i7d9D>-&k)XdU z4p4lZQT^f>6e|hy*~O)}*12x_WjMgE_R}xH%S_8*+yHWrC00CN+4%QWzx+4!^6Si` z=YL3wyY^0&fh>8WGcqm{^L@(}chAo@OiEHiXNF(xw2qI-ts%swx#p<{Fxt_?ky|zK z;qAyb<#7r*7vp)(3DI>r9U;7+b#ZQ{9{>Aa?qgnXak=7FT2)$@u&E({JgS%Ww%}ph zsyyujWa{;l53K&_>JSMOqc*1nU7#JhWPef5u^Z|{E=ynmOn z7?;XJk^_I(fAAF@+ zk_Bau7${AOC3fjQfXO>N-p!&162L@Uk1F+*c*h-c2$zUSdyWL}(`K9nD)_AIFAUBGWq)-XW z4ViHtaP;Ybka;moFe3&DDuzgg_YDCF6)_eB6fw4o;kh(y{#b&8DO?F?Vh4??IFru@ nI3hBvLgVrQOL~*GhrmgY>TCbUpmqcZYikasmiDeQ0s;sCTK}~n diff --git a/ssl/test/axTLS.withoutCA.p12 b/ssl/test/axTLS.withoutCA.p12 index c4eb54c444ca361efa2c3b4e4d5082607b2bb693..a297afe7a79d1576765ca846247bbc9045268950 100644 GIT binary patch delta 1385 zcmV-v1(y1y45bW^U4O@@#T9Ga6Y>HA2mpYB0$|k@Srn|v*0P^bMq8vzL9kPx5Qfc_ za6Xw;gl#wkxGX|$*FOW#<|YceSytlfmI4PWZXM(&bE0w{bC$v zkO<5c+wIkX#poHdW`(Td5(E9Rh^Of>ds@bu4VFWe<523c5`RMGV?r`0vSG+YsgZ@g z1hUQ#Am(llo~?LM!KJpd*o797bMJXelFs4KrNVNNMn|)O5KAE%t7F^JgPUb(6JzOJ z>X9wt?=MIPi|S>*yGuGhMI4d1;-J*_E@dK&A>EB&F1#UmLVzAcA3^9=iYZ;La1 zE39UNgrCwF)(K6)hi$jiyWW9p2bFkVXQ^`HdOii*iDERED0jxAU)p`{Ki_y-UTgBO z4`0RCW6s1f^;9@`YbgDRKQJZ1p$R_yX8lvBV7z5->3>T1#-`3WP5#^gJvHm6FR#9# z_`UY3Sj@S*HaI|vYEv&(ceICDG?f)m^} z%fCnX#+%sgBC-Z`S^KTDJ<7qk=@xVACR++q>x2c56o#QBx}I2XJ5&!K!mo{kfYsOEF@W7eBuaMxRiPz>)7w>L zX#E6Aj*eSzL{%IN4iAY3@o$sqj4K#=D4f>#Kf4Z$Q&V{h<_@b)j4WG%iL*hc*K!V0 z^YoCf^nYbQpnJR9_5=R;nCUYh`_tva7T8-6D#o+Z0kC}u>-|AqD>x6sDS!PXVA?{C zR2EJ);$dtXUG|MvImPwQf)T`JRU7D+JrO&oog`a8alV2>o1Fh*N2ak-r8zc7NOAKc zJ)ueW4gc9-0+C7zgz8KxIDq5a`hAq~fa6#;rGKdjyShP#vo^^b9o7+3JGnz*UFzyI zgu2GKAoYw5*5*IU5LSqam_ddD144^fV)fVoO!ZbYCGKf6tWc)t1&i~m{j7&kUQlRB zppc(qM)TDP#^9$(ZX~^d=sOkQ(`#_;r&&7q6uW}S!GaJJ5!4Yd8Xjj~V495>N; zx6o{IE#tN<{9(L77!)y5Fe3&DDuzgg_YDCF6)_eB6!~New~3WuYq1z{Z3rLM`d*+Q9?}9X)Eds_P8G0s;sCB~7YQ delta 1385 zcmV-v1(y1y45bW^U4N>6#&mVUU%dhX2mpYB0$^mfQ38%E)oJ5rX4WaRWGt%enHLKW z-RNvtgw%;!0f^^tq~Xxn9qTS<;gqiUXVZ+RRzTxWcea}8Toq}KBZ{3)!(VmYE!#2#_vsA#qRpMNu*9LVBr*q)LJn42TONazwR;3{LNn$B4T&{ zp>z0lg>uVb3Ast;bHo6=;B8FL=`ji!So!+0KI7|ufJ)Q2CZ`!)h!TgC*jZoS)Nzyq z^<*4jT||Bjg#(kr?~p;%3XQfhlhime2)M;cnypjPD}N1n!GqR(H4g9Q?n;|(l0DUv zLF+Zp((P7r!cjPp2Xf9`+~$Bh8REoo~iX`wKJ10e%bfl@ zj4fjDg$q|@95_UlfUaZ0iHtISa8b!#Nw6RymUW=|kP8rj*a|J2mOwWc

$u*0)S z8u9!c34fdcIU4f|H!sxJQR}}MnJkI}SXDYkIN8G+2o|t#nmCBfG@K4KNT8uQV(Z3s z*$&DzJ_u32=s)R8dF{&C)?D~J)IS1S%oYzE_z;}zh-GNAEW|nh0j< zZGR|w0|MO5+I!0B_g~HiwP0$e)@e*VHxVTa*(rh3?q#HK7|o9wQTOLcIL4gF6u&Ee zWaLR1F)K7sC5aCBLol8_^@>vzqe1EAHpS#F4X5i9|Z#$g$hA-omRpO+W3{Y;& zGxHn#EUXQZtz!O=E)bsdr_^lDmJpfs*ar>+)BShXY*=b)OFj1xOjc)+ZXJQ^y}RK8 z^!Z|29~XB-%va;wa)O^9Y{J@iz*hm)P5D2(5=G4GBL8&*yT5{WC^Vm|+cvu@e>Wz= z11xoD$_#>hW8e>Z(M>T@Fe3&DDuzgg_YDCF6)_eB6fw4o;kh(y{#b&8DO?F?Vh4?? rIFrQ%J|bjvzdp4~^@oJ|#aiQ&EM$KU=hXxVZ}elQACIG40s;sC?cf~7 zIK|7Unm`ng3i-DO3*p-53BL_jL55(V!6%Vh3YbP4_M(LNWyj7fmKUm#_+bQ4aO<=~ zx7?b{F##0R&CJ3#ZE1qm#>BqzG^NR=8B;QPh7OT}51~R-s(%3j0|5X5FbxI?Duzgg z_YDC71qA>Dfq?)(w3M2tiE`IJL delta 341 zcmV-b0jmDn1KR@=FoFTsFoFR<0to=|!-v4s^jE`?6GDfq?)EMG4OHX2YiNz%7EAv0S()?W;ngSWExi$ug;b3v&B+=7+M diff --git a/ssl/test/axTLS.x509_1024.pem b/ssl/test/axTLS.x509_1024.pem index 81f3eaf1c..ca0a8bfde 100644 --- a/ssl/test/axTLS.x509_1024.pem +++ b/ssl/test/axTLS.x509_1024.pem @@ -1,12 +1,12 @@ -----BEGIN CERTIFICATE----- -MIIB1zCCAUACCQDxw4fA1PRXwzANBgkqhkiG9w0BAQUFADA0MTIwMAYDVQQKEylh -eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNjA2 -MDcxMTQ0MzJaFw0zMzEwMjMxMTQ0MzJaMCwxFjAUBgNVBAoTDWF4VExTIFByb2pl +MIIB1zCCAUACCQCrCBinAwcn/TANBgkqhkiG9w0BAQUFADA0MTIwMAYDVQQKEylh +eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xMDEy +MjYyMjMzMzlaFw0yNDA5MDMyMjMzMzlaMCwxFjAUBgNVBAoTDWF4VExTIFByb2pl Y3QxEjAQBgNVBAMTCTEyNy4wLjAuMTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC -gYEA2OC/Fd7qr+jV/QuoqLPXRl2nJmwMtdm8xvjAeND2VmX4KUgOewumJX7oe3lv -OOW1t/TgnJFg9AbzQB75kRmpL0dDtZse3PaqHEl5ISjLqklz2QkFTALyTE1sHICn -FJFE/BKz4efjT0S6jMN0OehM0NRMJGG0QJWMwAq3AjkxhZMCAwEAATANBgkqhkiG -9w0BAQUFAAOBgQALRyRSfbZjeLyA3YdskEwzw1ynlwkcCU+bbrNaPkaSGseHFVnh -iFzOauKWqjLswu14i+CQZpMUw5irMzXTfV1RCpy5EFhHepiVZP9MXYIZ+eoPXprL -Midkym9YitDANvS5YzSl2jZQNknStzohM1s+1l8MmYO3sveLRMRec0GpAg== +gYEAzf2JSL42uZV21BMwDr+y7WcKwBY/UQmdKS+ybT8+bC+QgKFx3744xcupmkAU +kAr5twcL4drnCb8NV0GGYKHBJ5FbCphGG/aihPhlx84tlheqkfhhBFBw67RDt9ya +zDEBFNTNzMI3bWmC1sbEvvI0pcmmGVMyeoYOkYIPoUJUqgECAwEAATANBgkqhkiG +9w0BAQUFAAOBgQBAtJSaqIlyHQfls2uIIcI4Np56jElIaAwG6NsfTgXmMeP95g1r +2BMX4C0NuH7LIGyoc6f946f68wJgeB8TQEXudfUQ/Y9odNSsrgQJVSzb2AcHZWkn +br9eYUBWi9czO/9uU36dP8BAOqugUE6AR0YNHttM8RtdPCpUp036e3JmxQ== -----END CERTIFICATE----- diff --git a/ssl/test/axTLS.x509_1042.cer b/ssl/test/axTLS.x509_1042.cer new file mode 100644 index 0000000000000000000000000000000000000000..c1e1a6863d8f599f8078004eee1faa876984a844 GIT binary patch literal 477 zcmXqLV!Ub4#OTDt$*`J3VmULr`ac6+HcqWJkGAi;jEt?Mjh>z3lisv8BZ7bXiy3h<9gZjOWtrj7$a41b7qeqoFV}uBj0zwOs~r)mtJzc!#9`fSkzDXaS891pgpvJ{joy&Kd%)azfQP+cflf%Q4UI=b(ki8R?Rn9shf+&9|tn_bDB5)=C^y3+y3O0vcP literal 0 HcmV?d00001 diff --git a/ssl/test/axTLS.x509_1042.pem b/ssl/test/axTLS.x509_1042.pem new file mode 100644 index 000000000..ff80079a3 --- /dev/null +++ b/ssl/test/axTLS.x509_1042.pem @@ -0,0 +1,12 @@ +-----BEGIN CERTIFICATE----- +MIIB2TCCAUICCQCrCBinAwcn/jANBgkqhkiG9w0BAQUFADA0MTIwMAYDVQQKEylh +eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xMDEy +MjYyMjMzNDBaFw0yNDA5MDMyMjMzNDBaMCwxFjAUBgNVBAoTDWF4VExTIFByb2pl +Y3QxEjAQBgNVBAMTCTEyNy4wLjAuMTCBoTANBgkqhkiG9w0BAQEFAAOBjwAwgYsC +gYMDUYXtMubODhuyrWhYD7fomF6ZQMdjvQSYQIEEzdP0NsZq6a3wM1k6dMB1hmMs +GbT5jNfen3JdhL2s8AQ4rio6HJD3RCegOKr9Rt2r62MvWFSMflc6X4bH+bFxsnIV +jW6D+FLSeVPeVxpB0BVIQv2qSFNrTDlYbKU/RtGDx+TfgM354QIDAQABMA0GCSqG +SIb3DQEBBQUAA4GBAIEoXdKa4a2ThBYfcfAO8CCwnU4qUKOpAut3k3XSRdwOnQrG +epJ3UP1OpoMeoN2gtagcjcTzhXv/QPYbx5lRko5QfERFJwpNthy+Z8pa11JNY1dX +YugRs4Ad1BoKrCBYnm/QE7ZKVPEGFt2b/geFAW8HpndNWzn2PnTcdDQ/tC2X +-----END CERTIFICATE----- diff --git a/ssl/test/axTLS.x509_2048.cer b/ssl/test/axTLS.x509_2048.cer index c0badf7288617f5d618a62e1ad4a1343697a98ca..d92c8f4cf8cab97ab0efc225138b25ef3314bee7 100644 GIT binary patch delta 470 zcmV;{0V)391m6S`FoFVGFoFTZ0to=C2pFdW2PglL6GzBcJe|1#G@wcOJ_RbFZ{VD8d=Jgtx@?eB;+i!?A(}@Q z*Q`2?n}5`V8mO0fbZmyV{L$*aX=dJd4Atuip9z6kIr0SPsih$_+7Th;B4R)6a-;X9 zn1Nz7Pc!J{)flTH+fvuvNunx+hQ1DVL!>-R71UDlhr2hw(|?BoguI(|H*v7|=GIie zu?0#23a}FxQn57NE|HG`%GSe1Y@JEM{+?PZm_7>!echHJ-^o@f1$iY;SYtM*PJ zi>)h?d*!9U=F%%`y#B;uL&16#k~Y0tc1xjS9Jm=iDC4@!Tj_LVzu+u>WO|c)XPBf_ zf}$_JUJo)=7JrK^0s{d60Wb{)2`Yw2hW8Bt0R#mA1A&167`qR?XFk5`$56g!eKH~5 zVVqU5sKX~jRT3qASM z0gAIAV!eeFdw(UZ0s{d60Wb{)2`Yw2hW8Bt0R#mA1A&16JTF#r^sbEj^a5dO-<>$y zJf=3SFm*cgmC;Nx}i8(rB0aR&OI#=zqWUXjRU!ZQZ3j7*Qz6y)z?A z15`Yyf&Q=Yzzt^3#>i&I=Y)b2Q{HAco$(eJ9AH;T;v2?`?wV;&H_pYMq4qVK4+se) M3^D$%j_+%P=U7A5J^%m! diff --git a/ssl/test/axTLS.x509_2048.pem b/ssl/test/axTLS.x509_2048.pem index 1ed0141af..18c0b4534 100644 --- a/ssl/test/axTLS.x509_2048.pem +++ b/ssl/test/axTLS.x509_2048.pem @@ -1,15 +1,15 @@ -----BEGIN CERTIFICATE----- -MIICWzCCAcQCCQDxw4fA1PRXxDANBgkqhkiG9w0BAQQFADA0MTIwMAYDVQQKEylh -eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNjA2 -MDcxMTQ0MzJaFw0zMzEwMjMxMTQ0MzJaMCwxFjAUBgNVBAoTDWF4VExTIFByb2pl +MIICWzCCAcQCCQCrCBinAwcn/zANBgkqhkiG9w0BAQQFADA0MTIwMAYDVQQKEylh +eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xMDEy +MjYyMjMzNDBaFw0yNDA5MDMyMjMzNDBaMCwxFjAUBgNVBAoTDWF4VExTIFByb2pl Y3QxEjAQBgNVBAMTCTEyNy4wLjAuMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC -AQoCggEBAMKgv9v6z3AGRLOf3o092S/ENz33Z2tlguOIuh2Apwp2ziHFvul7m9iF -xsEcEARcvpkRPVo6ifJLjhJErenvvMAIS3WoO1lyenMaGoNddLeRRB0snRn7xRcl -DYzCYS3fhJmkE06RL/TCTyY9GXa7odRI8kcWuByZog/be15lsgn0pjNKjJICdCer -Otq0TAV/pfzRBF9lcyboHWQFOu9UVmDp3LsV/9o1GJbyKiNZd0j/GnDFOQbXy7GD -I9PJTRzo4GQj0cJHY7JelORKiIsymcoMNRTboFRAx5y9jAGF8Ks196Rq/+9gYsvi -eE0h+pbdLLbM0uZvAYqzIGK9hRR7Ja0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQA8 -L1Zz9K6M/PQCYWrfnTjbPKY2rTB1OvSV0Uwy5KKPQRS1+oK9dx4K0miX+1ZvI1bo -f7/1aFXOsW3dpTwYUSjJvTMjSwNUPKiB/q/xwA1mzsbIZsbnhIITU95mOJ3xFhgc -YFdJ4saL7pppTzfOxZ+h9jWbDwgJJAwx/q+O72uE5w== +AQoCggEBAKWgulghnDyduQE0oEn5PgUqoW/gnHB8D83dumyQU+KaNUQhmkcX16w6 +jZt/1IQaqJd5dGyGt/zR6r9pZt54DNXrCZ8JgVk58gToqaUhNNoRIeUiYj/scqP3 +pZiBYjVPM+jl1RirIttS191JoiqFhr4OdkOkPEwV1FLyh7s3v9OHAoS8m3U3cbD4 +5tZUwLEFSgEKsBMYUrE03i6RjwHK1sNGbJ1Jwv6eWlGLqYnlGI1TgoZrx5SeZ/2R +ii1jXKv2TiKLrSuSe+WlwebSK2u8/sRiQ8F6FZI2vVt2S6FjHLgZPijjusxb6XRl +v+AsfmR6k3xnmKRVgqIvvl4PMlUWiy0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQAY +uw++Zz6+68dQvmd9MiHeYZxVsajDJ0RVEiV9V/TFLsGmJXmtHHX0vVjZJSpDomWJ +WKPZu/HvR6KrtOtz+HM2ap5FFfPcg5LA2Dqau2tvTub1KdvDSbfaTqRsh1cQ8FQI +222gV/DG5AZ8AlSuDzTgrMuIeWjKZ6hhkirZVIO+rg== -----END CERTIFICATE----- diff --git a/ssl/test/axTLS.x509_4096.cer b/ssl/test/axTLS.x509_4096.cer index 40bbe94fdd8d5fc57dd7463e4e9530b9d661e7c6..03d110d57d7b7c789a2e50fc77fd0f0fd277ca01 100644 GIT binary patch delta 728 zcmV;}0w?|72Hyq~FoFYHFoFWa0to=C2pFdW2PgoM6G9K1=I8HROg|p+1F=O{_L~U zx=TEYHKzFG&Hn4lgGL!ZI!?Abt?Zg0>3z=*yTDHf{l6Nty%m{M|z$?N~GZfa&6?#vD#hY5(3Q9a4T0*tGe(Ft6O;-?^ z5C%F<@^3Rfw--TTl+taOmOr~GdK)(nn7CLdWf(~;M^tEIe?>)9rZ-b(z&fldu889x z)h3mjT0%dJ!+(=(7_LcQ9V0&@(3!*A2 zpMK32-0F?=hoLhJnSAONHFdP6NwU;F{`Wf6f~n*u3VW;1W%ft@-r2|4f9|*tLTng( zG+Vzxh${r}6pmrUe^-i=(4{Q`yyZVh>7l75SoFtLW`EoJ|`j#EdTCOP)XHc~{q|4pm1IR5A$oJ8}Ay$)$CsDSP zY?uUk34b+F2>}8F0RRCo4F(A+hDe6@4FLfJ1potqfdGmT1%$9B3t|4jV;YYUPPl2x zz<>fvW!Z^^_T&FBHAcw_@jr<>_3uVcojrO2$Ln+B$ywD;Q+WH?xn&+QhqfqS284nc z$BNpsc_aJaS2?;7vjHR)RdOE%9J5EM9R^%WU>$o|JO_!0>azEL)?=6{7=Uj`i?;lu Kdp0#aUf@nTXG*vL delta 728 zcmV;}0w?|72Hyq~FoFYHFoFWa0to=|!-v4s^jF1^6Gmaox?BB8At*_qHegN_Cm(UerlhGFqSp+Cz&}#6X`{2H3(| zN2wGExlD97fXsOeCn^W`4Pn++s+M#D>;O(~wfl~y;qgj?b^u`WqW``cC|ig?96y!M z7XS2>*B=ru_WY5}SzEd@PpCx)1I&la zpN50(f~}LjpktBkY~Bg4!8inQ|Da>u>Ru*7UzXwh=w_Xs?;*KZ6+rgL$!sa5#wCm% zhjof3R40eMa6w2mGZwmv4&f!N}s;~pPl6je9nV2!grWg(!oG)E6aIa;H)(*Iod{)t9s8dAW=H7 z3z)e#dVhbztB(Q$0RRCo4F(A+hDe6@4FLfJ1potqfdF!_tvz{}$o2Hr<4lKT^;SqG zQh)O;>7shNF706dhrCO4>3DhKqZAs5h%J5J&8E~cxQ9`EF~_QC$P>BXiKMeT17|Qd zds_4QMn7zXRu^f9T@R7ePZ#hM@R_lkR)7x2IvxA0R&Bc7HvVyP^Yv_!mRWDN&`41i K)A5aXgiUw+yjTVR diff --git a/ssl/test/axTLS.x509_4096.pem b/ssl/test/axTLS.x509_4096.pem index b7aed1cab..a9517fe37 100644 --- a/ssl/test/axTLS.x509_4096.pem +++ b/ssl/test/axTLS.x509_4096.pem @@ -1,20 +1,20 @@ -----BEGIN CERTIFICATE----- -MIIDWzCCAsQCCQDxw4fA1PRXxTANBgkqhkiG9w0BAQQFADA0MTIwMAYDVQQKEylh -eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNjA2 -MDcxMTQ0MzJaFw0zMzEwMjMxMTQ0MzJaMCwxFjAUBgNVBAoTDWF4VExTIFByb2pl +MIIDWzCCAsQCCQCrCBinAwcoADANBgkqhkiG9w0BAQQFADA0MTIwMAYDVQQKEylh +eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xMDEy +MjYyMjMzNDFaFw0yNDA5MDMyMjMzNDFaMCwxFjAUBgNVBAoTDWF4VExTIFByb2pl Y3QxEjAQBgNVBAMTCTEyNy4wLjAuMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC -AgoCggIBAPwntJldKsrQMAz6410QZVIdoHSrNrYQ8NzdfKMF1a0lBavUsAGjDa5n -qfQ0fTBAC3HTJtxghCe7DjohEHKk89uXYt+liQ3vo6Nc+Zw9l2bDyLKffpOdVc/l -tweL7FyQIM1fl2W5r/S9OffFRMJKXiN1HPXrfGYRrwz6B2cgUBtSgI+odwCmdfjb -Ya4Wo8Za53UGeQ7v0eQ0lEDgXAhx3c2YIoXXxfe2J/5KdZnpXtRJWTJaoAbaQ4tU -xECfVwbYwltHqRQJuUx0N4DMeQwnKgf3DWHWVqqWdALsAE5utfuOpuHxSoN2AGDz -ov++GihbiEAcP5XPFv/0ldcfEi/4X9lyHb0mvUIa6DTdHd17thFEM12caD0TCszq -in8JWVu6M0+oRQcDzIfMn4aD7oKtk76gY5HtbN4Jr8E4BHH/oGPe6l4mQl+W4f3o -Zp2e7yG5WBVA9sjJbCmlxiWMHod1iiZUJ4e9cEFINjMWuooPIo6xKMzZcGHzwkBa -zS6kHyTsHcfdHcu4aVMlJ9cKN/aesJgup/XseM3imzuJ3UqfvwCfneUKfM6DM8J3 -mFfSwUBvK8uLsMw5Elim/1oIbBG0PTt7BiLiNd0pU/weuL92y2+QB2oCPM0t5D7L -IYyoZHHNlvTCkQVNsCHgrDUtOdpGlKt6zzEgUTqwC5i5N3p/w6uPAgMBAAEwDQYJ -KoZIhvcNAQEEBQADgYEAcrCtPXmZyPX01uNMh2X1VkgmUn/zLemierou7WD/h7xL -dOl4eeKjFBqIiC19382m1DK4h1F8MceqaMgTueCJpLM7A2cwN3ta8/pGP2yEVhdp -h10PkdRPF/AU8JmxnFaADsc6+6xWbbrdNv5xcvP1bJKWWW+30EhRF9PxjXiETXc= +AgoCggIBAKOYAobI/sEAa0jY3Wnh2UBTQbKzLIEF0/PuVOehqtnXZ1T+7LPTuks8 +ijWm+OXN/uvLg0YZQDpOtjut7Jog6X3PDr1fnGCZB9ByzUqVDCC3OtY3Vlp8ax0b +x0JuQ65ZHP7PlQn+2DDcmzsymooHXWdajCOb7TXdZCt48fau9fE/1pp4+Z0sKUiu +bld/ihm5IgbmwSbRWrbHzZJ3MavMCHMKwCvCUDMU1s4Vek+DxZta3ApKPB5aQrW9 +fupNT01XEJkQBjpO8m8zPrcXQWKU0m2Ylj+7KXobNw+YuFgoZRhJLEdUaGN/RUVU +pjdTZ8A6rCquiOMg1SaVm1pCP4zDk2wYrklfHSM/I9CZxBoixWEmYcVNAxREcm5Q +LmLWhvE8PTL5MoOhkaOAn37NFtzqjfSHoTMMmXzqFjV1tKZJstQ+/vc61IKp5CcK +e6vPZfZH/t7Zx9h/7rgQQmwYfDRbv0GIKwTwFI5hxH9XipPQpS0CvOU/SemhqSVY +9MdVZtv75Wq7Oagcd00qwvgSoNhVUKEym2zeckkt2ukcllohpLr5H7xRSlk1vXfJ +aXh9Yr1zxr1FWeSzlv9lu6VAFd7RV++i0fj99FnjgWMFUHvfXVExCS+jnD1VzfqW +Hc1arikSZ1C1OaTL3eEDyC0RyPfRwCFWk4onUbaUbJgEegk1UQkBAgMBAAEwDQYJ +KoZIhvcNAQEEBQADgYEAihEFhLAmC2H+wWMajxFOuGnKwIACS2XZiYX24/8wNUbJ +CvE/iTv170ZPnT16Asfrc+PJWdVPU3j72bllHjKHtihgBoSCGceK2rN5I/vgVzm6 +EbMBJBZVch8FHLNHqR0GXEtge1k8B4mI6rL3f9ZjmCkYgG9Ii7b8o3s2NT1e4E4= -----END CERTIFICATE----- diff --git a/ssl/test/axTLS.x509_512.cer b/ssl/test/axTLS.x509_512.cer index 48c6e13aa0af5678668c7d4a3245a3304030f01e..ab8537901dcb554c3e8913db640427ff6f96b5c0 100644 GIT binary patch delta 255 zcmV`1I7^edVC;X8TNgFXRF)}hXGBPtWGdNlo4Kg$^ zIWRLaGBYzXIFWWpK*-8nPP?|aIqFW!gl=!;cx+KRRTPd{I+q%^`tsdqZ6z+M-dVxk z@sQ$w)Z?*x$#qjAkjc@UZ`v8Z(6{b%7m@xLe;bx|S`^y`v>6C1+Uh2tbsc^!%V|{b z0>!-N!FDAFT{!L0Kmvv;%yz$e5Vmf#_?+PV(xvXGYp^n4OR7uKI{h4LA$kt zX?|rM7UpH}O0!wA=0d|EHa!9p&aSlcr;{icMS==F6)@eB!|iKhrrbISHh7JNgFUWFg7qZF)=hWGcsBi4Kp(_ zFfubSF*GzYGLd#jK+!ueU#S5?J%(*^zCdnK!AXBtb)hXb<-t7_Lcx{!|rfVZ|0=xRXKgPd)!Gy^;PHe+orDi@;j-#pg+HimSdbeiH?M(w-AE z)znMWx6-o`7W7)LwQ;<&^_G?+^z?NkWSKB;!Ri!v%ISqhJRXg1Caw0FoFS%FoFR$0to=C2pFdW2PgrN6G0j=FflSRHZn3ZGc+<<7Y#Br zFgY+YGBPtWG?8vhf5+Ic+WiX7T;j*FqQYw=ShKz=m1$)6BGa^jRmSOoB-%L9JO=U) zlB=TOwU9s$yIE+@SB?TA)*)kaSBe0!S`eypPnuHnb2ON)JZ=mQ;5BrCyTZ3p<-zd+ z)JYeDg9Ex|a2H1Dps8IfuUg8UtX$?E?biWwz?F>Xs?AV?Sfc_10RRCo4F(A+hDe6@ z4FLfK1pos<0K9l-*{D_!H028vtjMy<|BVVEVQA}FeeR?ZQfLBR0n|qZLW=yOF*k5q Yi#WHCV&E6$id&}}ntg`z!%!UoPq&g1Caw0FoFS%FoFR$0to=|!-v4s^jF4_6G0jnjsjMQ#-5S83#m?5K#sU z-Iw3AEww`>j~GhTAcqO=&eZ-QlR~XaSG5wn3VqN&=I+fWwq#?~ph8G)^?yR=O8sk; z4Px# diff --git a/ssl/test/axTLS.x509_device.pem b/ssl/test/axTLS.x509_device.pem index e9cbaaf31..048dbd922 100644 --- a/ssl/test/axTLS.x509_device.pem +++ b/ssl/test/axTLS.x509_device.pem @@ -1,24 +1,24 @@ -----BEGIN CERTIFICATE----- -MIIBjTCCATcCCQDxw4fA1PRXxjANBgkqhkiG9w0BAQUFADAsMRYwFAYDVQQKEw1h -eFRMUyBQcm9qZWN0MRIwEAYDVQQDEwkxMjcuMC4wLjEwHhcNMDYwNjA3MTE0NDMy -WhcNMzMxMDIzMTE0NDMyWjArMSkwJwYDVQQKEyBheFRMUyBQcm9qZWN0IERldmlj -ZSBDZXJ0aWZpY2F0ZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA1CIODRIr -v3YgwJW7Fm0wITCsOIgX9l+aIRiXUzur4RkHRJIQUQYM3ZfftC21QyWPGErVIIcJ -7s7U/iKTQq1LV7USvAp90D/m7s0ntmRj1aBCSG71f0LnSv1rlA8kzUkU7VuEt0Tt -+iqrW0+sYdUBk11dyPLKe6sJnMrJJamVvBsCAwEAATANBgkqhkiG9w0BAQUFAANB -ABC3Uc6uImIpcLl1WYu8K8qkGnVT4K9JkdXHQFbhFZs37lvITrOHQ3j2oGXTbdAx -JFJ3II9xXkm+nc7oLHqhXlc= +MIIBjTCCATcCCQCrCBinAwcoATANBgkqhkiG9w0BAQUFADAsMRYwFAYDVQQKEw1h +eFRMUyBQcm9qZWN0MRIwEAYDVQQDEwkxMjcuMC4wLjEwHhcNMTAxMjI2MjIzMzQy +WhcNMjQwOTAzMjIzMzQyWjArMSkwJwYDVQQKEyBheFRMUyBQcm9qZWN0IERldmlj +ZSBDZXJ0aWZpY2F0ZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAx9iw2v0K +zlzix7KiwmskWLO+KpVpZPci07SCVcbpgSTaONE8BvIPkqui4bWQQA+7WWjPV44C +ItYhY3NXigCxWhCqc0+aUvRzNJiuPG4MDuA1dIG7wrdS5cHxAtRJF4KDA7pmcBdG +6aCpXSyvWsqerFzmHu3XAXPAlYzoqs1Qg6MCAwEAATANBgkqhkiG9w0BAQUFAANB +ALx4Z9moVhA05QsUrMiyy/+NCiFhaOtZfe6kElJoAl4B1EcGQor8ozE3cFuLOLeQ +YuAX5YpbpxuafYbzw1AdAU8= -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- -MIIB3zCCAUgCCQCdbnM4pjqlWjANBgkqhkiG9w0BAQUFADA0MTIwMAYDVQQKEylh -eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNjA2 -MDcxMTQ0MzJaFw0zMzEwMjMxMTQ0MzJaMDQxMjAwBgNVBAoTKWF4VExTIFByb2pl +MIIB3zCCAUgCCQD76Ccq3Co3qjANBgkqhkiG9w0BAQUFADA0MTIwMAYDVQQKEylh +eFRMUyBQcm9qZWN0IERvZGd5IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xMDEy +MjYyMjMzMzdaFw0yNDA5MDMyMjMzMzdaMDQxMjAwBgNVBAoTKWF4VExTIFByb2pl Y3QgRG9kZ3kgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MIGfMA0GCSqGSIb3DQEBAQUA -A4GNADCBiQKBgQCnZdk20fYWh8O6kDTt0AuJWyp0YIrb7W1UNNMPXI5wA4J59IVj -Nmk5wocm9+Hqzbg7rORAN/mHPBhzLAjhnm1HODs36hW15DtbDkkH4wCM/Tsyv79m -n0xq1V6peK3t9vi2D4p/IRjHkYR2jm+BeknopijhY0kHHfpGTHa2DnVirwIDAQAB -MA0GCSqGSIb3DQEBBQUAA4GBAB0LgNo0oCcwIie5plgwwFybQ8x95q6e3wndM/Mp -3gjcAFbGuchpo3dfFlTcRI0KyERb3q1MVxPM4sff9nT7EdHVyK9s8/ITkP2dcTKc -flbcTEfJVIeM8L2P5F41Hvn9GuGcMW8EmsC06gdbp1LLnqsdrXdMNBsAUBXfgPrU -+UcZ +A4GNADCBiQKBgQCfxX6VHEhZNsMIqPPxt53h1UpfX1jU7ctqwBR4dpWRj3H6cCBN +EK8xj7IVcBTJq6vcMRDwrAUrElSIZl8Kv6+ZqhTss2j+E2tfzkzehP9LcAdAR+UM +JPBsYXic/+vmH5JCMO7CXLUsDJmO2q2Z1TjTtchu2DgAueTo0hWRtMvbMwIDAQAB +MA0GCSqGSIb3DQEBBQUAA4GBABoJU0aQMTocVLNbcY4tbfqLck2oAn/OVjG0p/8p +GIJzlVKOtZ76ZkqHIbcXNKNlgjXy+4S3R+6+mkYcn0JVbVg7eN0tsDlMB04YyFaD +95D47KEzmDky4Yj2nqI4SmvVTf2lyYxV1zknrFUXND+WvjGxge3gpJxtMoTGE5E0 +Jc3F -----END CERTIFICATE----- diff --git a/ssl/test/killopenssl.sh b/ssl/test/killopenssl.sh index 17950fbae..f5adf2db5 100755 --- a/ssl/test/killopenssl.sh +++ b/ssl/test/killopenssl.sh @@ -1,2 +1,3 @@ #!/bin/sh ps -ef|grep openssl | /usr/bin/awk '{print $2}' |xargs kill -9 +sleep 1 diff --git a/ssl/test/make_certs.sh b/ssl/test/make_certs.sh index dfc39d4f5..08f399349 100755 --- a/ssl/test/make_certs.sh +++ b/ssl/test/make_certs.sh @@ -69,15 +69,18 @@ EOF openssl genrsa -out axTLS.ca_key.pem 1024 openssl genrsa -out axTLS.key_512.pem 512 openssl genrsa -out axTLS.key_1024.pem 1024 +openssl genrsa -out axTLS.key_1042.pem 1042 openssl genrsa -out axTLS.key_2048.pem 2048 openssl genrsa -out axTLS.key_4096.pem 4096 openssl genrsa -out axTLS.device_key.pem 1024 openssl genrsa -aes128 -passout pass:abcd -out axTLS.key_aes128.pem 512 openssl genrsa -aes256 -passout pass:abcd -out axTLS.key_aes256.pem 512 + # convert private keys into DER format openssl rsa -in axTLS.key_512.pem -out axTLS.key_512 -outform DER openssl rsa -in axTLS.key_1024.pem -out axTLS.key_1024 -outform DER +openssl rsa -in axTLS.key_1042.pem -out axTLS.key_1042 -outform DER openssl rsa -in axTLS.key_2048.pem -out axTLS.key_2048 -outform DER openssl rsa -in axTLS.key_4096.pem -out axTLS.key_4096 -outform DER openssl rsa -in axTLS.device_key.pem -out axTLS.device_key -outform DER @@ -89,6 +92,8 @@ openssl req -out axTLS.x509_512.req -key axTLS.key_512.pem -new \ -config ./certs.conf openssl req -out axTLS.x509_1024.req -key axTLS.key_1024.pem -new \ -config ./certs.conf +openssl req -out axTLS.x509_1042.req -key axTLS.key_1042.pem -new \ + -config ./certs.conf openssl req -out axTLS.x509_2048.req -key axTLS.key_2048.pem -new \ -config ./certs.conf openssl req -out axTLS.x509_4096.req -key axTLS.key_4096.pem -new \ @@ -102,29 +107,32 @@ openssl req -out axTLS.x509_aes256.req -key axTLS.key_aes256.pem \ # generate the actual certs. openssl x509 -req -in axTLS.ca_x509.req -out axTLS.ca_x509.pem \ - -sha1 -days 10000 -signkey axTLS.ca_key.pem + -sha1 -days 5000 -signkey axTLS.ca_key.pem openssl x509 -req -in axTLS.x509_512.req -out axTLS.x509_512.pem \ - -sha1 -CAcreateserial -days 10000 \ + -sha1 -CAcreateserial -days 5000 \ -CA axTLS.ca_x509.pem -CAkey axTLS.ca_key.pem openssl x509 -req -in axTLS.x509_1024.req -out axTLS.x509_1024.pem \ - -sha1 -CAcreateserial -days 10000 \ + -sha1 -CAcreateserial -days 5000 \ + -CA axTLS.ca_x509.pem -CAkey axTLS.ca_key.pem +openssl x509 -req -in axTLS.x509_1042.req -out axTLS.x509_1042.pem \ + -sha1 -CAcreateserial -days 5000 \ -CA axTLS.ca_x509.pem -CAkey axTLS.ca_key.pem openssl x509 -req -in axTLS.x509_2048.req -out axTLS.x509_2048.pem \ - -md5 -CAcreateserial -days 10000 \ + -md5 -CAcreateserial -days 5000 \ -CA axTLS.ca_x509.pem -CAkey axTLS.ca_key.pem openssl x509 -req -in axTLS.x509_4096.req -out axTLS.x509_4096.pem \ - -md5 -CAcreateserial -days 10000 \ + -md5 -CAcreateserial -days 5000 \ -CA axTLS.ca_x509.pem -CAkey axTLS.ca_key.pem openssl x509 -req -in axTLS.x509_device.req -out axTLS.x509_device.pem \ - -sha1 -CAcreateserial -days 10000 \ + -sha1 -CAcreateserial -days 5000 \ -CA axTLS.x509_512.pem -CAkey axTLS.key_512.pem openssl x509 -req -in axTLS.x509_aes128.req \ -out axTLS.x509_aes128.pem \ - -sha1 -CAcreateserial -days 10000 \ + -sha1 -CAcreateserial -days 5000 \ -CA axTLS.ca_x509.pem -CAkey axTLS.ca_key.pem openssl x509 -req -in axTLS.x509_aes256.req \ -out axTLS.x509_aes256.pem \ - -sha1 -CAcreateserial -days 10000 \ + -sha1 -CAcreateserial -days 5000 \ -CA axTLS.ca_x509.pem -CAkey axTLS.ca_key.pem # note: must be root to do this @@ -149,6 +157,7 @@ rm *.conf openssl x509 -in axTLS.ca_x509.pem -outform DER -out axTLS.ca_x509.cer openssl x509 -in axTLS.x509_512.pem -outform DER -out axTLS.x509_512.cer openssl x509 -in axTLS.x509_1024.pem -outform DER -out axTLS.x509_1024.cer +openssl x509 -in axTLS.x509_1042.pem -outform DER -out axTLS.x509_1042.cer openssl x509 -in axTLS.x509_2048.pem -outform DER -out axTLS.x509_2048.cer openssl x509 -in axTLS.x509_4096.pem -outform DER -out axTLS.x509_4096.cer openssl x509 -in axTLS.x509_device.pem -outform DER -out axTLS.x509_device.cer diff --git a/ssl/test/ssltest.c b/ssl/test/ssltest.c index 328bbdca3..86997d785 100644 --- a/ssl/test/ssltest.c +++ b/ssl/test/ssltest.c @@ -66,6 +66,7 @@ static int g_port = 19001; #define TEST1_SIZE 16 #define TEST2_SIZE 32 +#if 0 static int AES_test(BI_CTX *bi_ctx) { AES_CTX aes_key; @@ -419,6 +420,7 @@ static int HMAC_test(BI_CTX *bi_ctx) end: return res; } +#endif /************************************************************************** * BIGINT tests @@ -427,10 +429,12 @@ end: static int BIGINT_test(BI_CTX *ctx) { int res = 1; + +#ifndef REGISTER_8 +#ifndef REGISTER_16 bigint *bi_data, *bi_exp, *bi_res; const char *expnt, *plaintext, *mod; uint8_t compare[MAX_KEY_BYTE_SIZE]; - /** * 512 bit key */ @@ -461,6 +465,47 @@ static int BIGINT_test(BI_CTX *ctx) bi_export(ctx, bi_res, compare, 64); if (memcmp(plaintext, compare, 64) != 0) goto end; +#endif +#endif + + /* + * Multiply with psssible carry issue (8 bit) + */ + { + int i; + bigint *bi_x = bi_str_import( + ctx, + "AFD5060E224B70DA99EFB385BA5C0D2BEA0AD1DAAA52686E1A02D677BC65C1DA7A496BBDCC02999E8814F10AFC4B8E0DD4E6687E0762CE717A5EA1E452B5C56065C8431F0FB9D23CFF3A4B4149798C0670AF7F9565A0EAE5CF1AB16A1F0C3DD5E485DC5ABB96EBE0B6778A15B7302CBCE358E4BF2E2E30932758AC6EFA9F5828"); + uint8_t exp_sqr_result[bi_x->size*2]; + uint8_t exp_mlt_result[bi_x->size*2]; + bigint *arg2 = bi_clone(ctx, bi_x); + bigint *arg3 = bi_clone(ctx, bi_x); + bigint *sqr_result = bi_square(ctx, bi_x); + bigint *mlt_result = bi_multiply(ctx, arg2, arg3); + //bi_print("SQR_RESULT", sqr_result); + //bi_print("MLT_RESULT", mlt_result); + + if (bi_compare(sqr_result, mlt_result) != 0) + { + bi_export(ctx, sqr_result, exp_sqr_result, sizeof(exp_sqr_result)); + bi_export(ctx, mlt_result, exp_mlt_result, sizeof(exp_mlt_result)); + bi_free(ctx, sqr_result); + bi_free(ctx, mlt_result); + + for (i = 0; i < sizeof(exp_sqr_result); i++) + { + if (exp_sqr_result[i] != exp_mlt_result[i]) + { + printf("Error: SQUARE failed %d %02x %02x\n", i, + exp_sqr_result[i], exp_mlt_result[i]); + goto end; + } + } + } + + bi_free(ctx, sqr_result); + bi_free(ctx, mlt_result); + } printf("All BIGINT tests passed\n"); res = 0; @@ -755,9 +800,7 @@ typedef struct static void do_client(client_t *clnt) { char openssl_buf[2048]; - - /* make sure the main thread goes first */ - sleep(0); + usleep(500000); /* allow server to start */ /* show the session ids in the reconnect test */ if (strcmp(clnt->testname, "Session Reuse") == 0) @@ -882,7 +925,11 @@ static int SSL_server_test( while ((size = ssl_read(ssl, &read_buf)) == SSL_OK); SOCKET_CLOSE(client_fd); - if (size < SSL_OK) /* got some alert or something nasty */ + if (size == SSL_CLOSE_NOTIFY) + { + ret = SSL_OK; + } + else if (size < SSL_OK) /* got some alert or something nasty */ { ret = size; @@ -1392,7 +1439,7 @@ static int SSL_client_test( client_test_exit: ssl_free(ssl); SOCKET_CLOSE(client_fd); - usleep(200000); /* allow openssl to say something */ + usleep(500000); /* allow openssl to say something */ if (sess_resume) { @@ -1566,7 +1613,7 @@ static void do_basic(void) SSL *ssl_clnt; SSL_CTX *ssl_clnt_ctx = ssl_ctx_new( DEFAULT_CLNT_OPTION, SSL_DEFAULT_CLNT_SESS); - usleep(200000); /* allow server to start */ + usleep(500000); /* allow server to start */ if ((client_fd = client_socket_init(g_port)) < 0) goto error; @@ -1692,7 +1739,7 @@ void do_multi_clnt(multi_t *multi_data) if ((client_fd = client_socket_init(multi_data->port)) < 0) goto client_test_exit; - sleep(1); + usleep(500000); ssl = ssl_client_new(multi_data->ssl_clnt_ctx, client_fd, NULL, 0); if ((res = ssl_handshake_status(ssl))) @@ -1869,7 +1916,7 @@ static int header_issue(void) size = fread(buf, 1, sizeof(buf), f); SOCKET_WRITE(client_fd, buf, size); - usleep(200000); + usleep(500000); ret = 0; error: @@ -1911,6 +1958,7 @@ int main(int argc, char *argv[]) bi_ctx = bi_initialize(); +#if 0 if (AES_test(bi_ctx)) { printf("AES tests failed\n"); @@ -1945,6 +1993,7 @@ int main(int argc, char *argv[]) goto cleanup; } TTY_FLUSH(); +#endif if (BIGINT_test(bi_ctx)) { diff --git a/ssl/tls1.c b/ssl/tls1.c index 94f413b53..809d45cb0 100755 --- a/ssl/tls1.c +++ b/ssl/tls1.c @@ -245,8 +245,10 @@ EXP_FUNC void STDCALL ssl_free(SSL *ssl) if (ssl == NULL) /* just ignore null pointers */ return; - /* spec says we must notify when we are dying */ - send_alert(ssl, SSL_ALERT_CLOSE_NOTIFY); + /* only notify if we weren't notified first */ + if (!IS_SET_SSL_FLAG(SSL_RECEIVED_CLOSE_NOTIFY)) + /* spec says we must notify when we are dying */ + send_alert(ssl, SSL_ALERT_CLOSE_NOTIFY); ssl_ctx = ssl->ssl_ctx; @@ -284,7 +286,7 @@ EXP_FUNC int STDCALL ssl_read(SSL *ssl, uint8_t **in_data) int ret = basic_read(ssl, in_data); /* check for return code so we can send an alert */ - if (ret < SSL_OK) + if (ret < SSL_OK && ret != SSL_CLOSE_NOTIFY) { if (ret != SSL_ERROR_CONN_LOST) { @@ -1276,7 +1278,15 @@ int basic_read(SSL *ssl, uint8_t **in_data) case PT_ALERT_PROTOCOL: /* return the alert # with alert bit set */ - ret = -buf[1]; + if(buf[0] == SSL_ALERT_TYPE_WARNING && + buf[1] == SSL_ALERT_CLOSE_NOTIFY) + { + ret = SSL_CLOSE_NOTIFY; + SET_SSL_FLAG(SSL_RECEIVED_CLOSE_NOTIFY); + } + else + ret = -buf[1]; + DISPLAY_ALERT(ssl, buf[1]); break; diff --git a/ssl/tls1.h b/ssl/tls1.h index b64b4fda6..cead605de 100755 --- a/ssl/tls1.h +++ b/ssl/tls1.h @@ -62,6 +62,7 @@ extern "C" { #define SSL_SESSION_RESUME 0x0008 #define SSL_IS_CLIENT 0x0010 #define SSL_HAS_CERT_REQ 0x0020 +#define SSL_RECEIVED_CLOSE_NOTIFY 0x0040 /* some macros to muck around with flag bits */ #define SET_SSL_FLAG(A) (ssl->flag |= A) diff --git a/ssl/tls1_clnt.c b/ssl/tls1_clnt.c index 3289afa75..0e9c10af4 100644 --- a/ssl/tls1_clnt.c +++ b/ssl/tls1_clnt.c @@ -250,6 +250,12 @@ static int process_server_hello(SSL *ssl) offset = 6 + SSL_RANDOM_SIZE; /* skip of session id size */ sess_id_size = buf[offset++]; + if (sess_id_size > SSL_SESSION_ID_SIZE) + { + ret = SSL_ERROR_INVALID_SESSION; + goto error; + } + if (num_sessions) { ssl->session = ssl_session_update(num_sessions, diff --git a/www/index.html b/www/index.html index 21d2b676d..e7e080e44 100755 --- a/www/index.html +++ b/www/index.html @@ -7087,7 +7087,7 @@ if (useJavaSaver)
changes, notes and errata
Type the text for 'YourName'
-
@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.6@@\n\n!!__SSL Library__\n* A fix to find_max_exp_index() (thanks to Hardy Griech).\n* Check is made to get_cipher_info() if the appropriate cipher is not found (thanks to Hardy Griech).\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.5@@\n\n!!__SSL Library__\n* The custom RNG updated to use an entropy pool (with better hooks to use counters).\n\n!!__axhttpd__\n* Headers are case insensitive (thanks to Joe Pruett for this and the following).\n* Child zombie issue fixed.\n* EOF on ~POSTs fixed.\n* Expect is ignored.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.4@@\n\n!!__SSL Library__\n* Client renegotiation now results in an error. This is the result of a security flaw described in this paper http://extendedsubset.com/Renegotiating_TLS.pdf, and also is explained in detail here http://www.cupfighter.net/index.php/2009/11/tls-renegotiation-attack/.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.3@@\n\n!!__SSL Library__\n* v3 certificates with ~SANs now supports (thanks to Carsten Sørensen).\n* axtlswrap added - a port of sslwrap (thanks to Steve Bennett)\n\n!!__axhttpd__\n* shutdown() called before socket close in CGI (thanks to Tom Brown)\n* command-line parameters to specify the http/https port.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.2@@\n\n!!__axhttpd__\n* File uploads over 1kB (but under MAXPOSTDATASIZE) are now supported.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.1@@\n\n!!__SSL Library__\n* Certificate verification now works for Firefox.\n* Extended the openssl API.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.0@@\n\n!!__SSL Library__\n* A self-signed certificate will be verified as ok provided that that it is on the certificate authority list.\n* Certificates are not verified when added as certificate authorities (since self-signed and expired certificates can be added to browsers etc)\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.9@@\n\n!!__SSL Library__\n* Now support MS IIS resource kit certificates (thanks to Carsten Sørensen).\n* Fixed a memory leak when freeing more than one CA certificate.\n* The bigint library had a problem with squaring which affected classical reduction (thanks to Manuel Klimek).\n\n!!__axhttpd__\n* Brought back setuid()/setgid() as an option.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.8@@\n\n!!__SSL Library__\n* Now using a BSD style license.\n* Self-signed certificates can now be automatically generated (the keys still need to be provided).\n* A new API call //ssl_x509_create()// can be used to programatically create the certificate.\n* Certificate/keys can be loaded automatically given a file location.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.7@@\n\n!!__SSL Library__\n\n* Variable sized session id's is now better handled for session caching. It has meant a new API call //ssl_get_session_id_size()// and a change to //ssl_client_new()// to define the session id size.\n* Muliple records with a single header are now better supported (thanks to Hervé Sibert).\n* ~MD2 added for Verisign root cert verification (thanks to Byron Rakitzis).\n* The ~MD5/~SHA1 digests are calculated incrementally to reduce memory (thanks to Byron Rakitzis).\n* The bigint cache is now cleared regularly to reduce memory.\n\n!!__axhttpd__\n\n* Improved the POST handling (thanks to Christian Melki).\n* CSS files now work properly.\n* Lua's CGI launcher location is configurable.\n* //vfork()// is now used for CGI for performance reasons.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.6@@\n\n!!__SSL Library__\n\n* ~RC4 speed improvements\n* Lua samples/bindings now work properly\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.5@@\n\n!!__SSL Library__\n\n* Session id's can now be variable lengths in server hello messages.\n* 0 length client certificates are now supported.\n* ssl_version() now returns just the version and not the date.\n* ssl_write() was not sending complete packets under load.\n\n!!__axhttpd__\n\n* Completely updated the CGI code.\n* Lua now integrated - Lua scripts and Lua Pages now run.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.4@@\n\n!!__SSL Library__\n\n* Fixed a Win32 crypto library issue with non-Administrator users\n* Removed compiler warnings that showed up in ~FC6.\n* GNU TLS certificates are now accepted.\n* Separated the send/receive headers for HMAC calculations.\n* Fixed a compilation problem with swig/perl/~FC6.\n* Fixed an issue with loading PEM CA certificates.\n\n!!__axhttpd__\n\n* Made //setuid()/setgid()// call an mconf option.\n* Made //chroot()// an mconf option. Default to //chdir()// instead.\n* Removed optional permissions checking.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.1@@\n\n!!__SSL Library__\n\n* AES should now work on 16bit processors (there was an alignment problem).\n* Various freed objects are cleared before freeing.\n* Header files now installed in ///usr/local/include/axTLS//.\n* -DCYGWIN replaced with -~DCONFIG_PLATFORM_CYGWIN (and the same for Solaris).\n* removed "-noextern" option in Swig. Fixed some other warnings in Win32.\n* SSLCTX changed to ~SSL_CTX (to be consistent with openssl). SSLCTX still exists for backwards compatibility.\n* malloc() and friends call abort() on failure.\n* Fixed a memory leak in directory listings.\n* Added openssl() compatibility functions.\n* Fixed Cygwin 'make install' issue.\n\n!!__axhttpd__\n\n* main.c now becomes axhttpd.c.\n* Header file issue fixed (in mime_types.c).\n* //chroot()// now used for better security.\n* Basic authentication implemented (via .htpasswd).\n* SSL access/denial protection implemented (via .htaccess).\n* Directory access protection implemented (via .htaccess).\n* Can now have more than one CGI file extension in mconf.\n* "~If-Modified-Since" request now handled properly.\n* Performance tweaks to remove //ssl_find()//.
+
@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.7@@\n\n!!__SSL Library__\n* A fix to find_max_exp_index() (thanks to Hardy Griech).\n* Check is made to get_cipher_info() if the appropriate cipher is not found (thanks to Hardy Griech).\n* Extra x509_free() removed from do_client_connect().\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.5@@\n\n!!__SSL Library__\n* The custom RNG updated to use an entropy pool (with better hooks to use counters).\n\n!!__axhttpd__\n* Headers are case insensitive (thanks to Joe Pruett for this and the following).\n* Child zombie issue fixed.\n* EOF on ~POSTs fixed.\n* Expect is ignored.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.4@@\n\n!!__SSL Library__\n* Client renegotiation now results in an error. This is the result of a security flaw described in this paper http://extendedsubset.com/Renegotiating_TLS.pdf, and also is explained in detail here http://www.cupfighter.net/index.php/2009/11/tls-renegotiation-attack/.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.3@@\n\n!!__SSL Library__\n* v3 certificates with ~SANs now supports (thanks to Carsten Sørensen).\n* axtlswrap added - a port of sslwrap (thanks to Steve Bennett)\n\n!!__axhttpd__\n* shutdown() called before socket close in CGI (thanks to Tom Brown)\n* command-line parameters to specify the http/https port.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.2@@\n\n!!__axhttpd__\n* File uploads over 1kB (but under MAXPOSTDATASIZE) are now supported.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.1@@\n\n!!__SSL Library__\n* Certificate verification now works for Firefox.\n* Extended the openssl API.\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.2.0@@\n\n!!__SSL Library__\n* A self-signed certificate will be verified as ok provided that that it is on the certificate authority list.\n* Certificates are not verified when added as certificate authorities (since self-signed and expired certificates can be added to browsers etc)\n\n@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.9@@\n\n!!__SSL Library__\n* Now support MS IIS resource kit certificates (thanks to Carsten Sørensen).\n* Fixed a memory leak when freeing more than one CA certificate.\n* The bigint library had a problem with squaring which affected classical reduction (thanks to Manuel Klimek).\n\n!!__axhttpd__\n* Brought back setuid()/setgid() as an option.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.8@@\n\n!!__SSL Library__\n* Now using a BSD style license.\n* Self-signed certificates can now be automatically generated (the keys still need to be provided).\n* A new API call //ssl_x509_create()// can be used to programatically create the certificate.\n* Certificate/keys can be loaded automatically given a file location.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.7@@\n\n!!__SSL Library__\n\n* Variable sized session id's is now better handled for session caching. It has meant a new API call //ssl_get_session_id_size()// and a change to //ssl_client_new()// to define the session id size.\n* Muliple records with a single header are now better supported (thanks to Hervé Sibert).\n* ~MD2 added for Verisign root cert verification (thanks to Byron Rakitzis).\n* The ~MD5/~SHA1 digests are calculated incrementally to reduce memory (thanks to Byron Rakitzis).\n* The bigint cache is now cleared regularly to reduce memory.\n\n!!__axhttpd__\n\n* Improved the POST handling (thanks to Christian Melki).\n* CSS files now work properly.\n* Lua's CGI launcher location is configurable.\n* //vfork()// is now used for CGI for performance reasons.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.6@@\n\n!!__SSL Library__\n\n* ~RC4 speed improvements\n* Lua samples/bindings now work properly\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.5@@\n\n!!__SSL Library__\n\n* Session id's can now be variable lengths in server hello messages.\n* 0 length client certificates are now supported.\n* ssl_version() now returns just the version and not the date.\n* ssl_write() was not sending complete packets under load.\n\n!!__axhttpd__\n\n* Completely updated the CGI code.\n* Lua now integrated - Lua scripts and Lua Pages now run.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.4@@\n\n!!__SSL Library__\n\n* Fixed a Win32 crypto library issue with non-Administrator users\n* Removed compiler warnings that showed up in ~FC6.\n* GNU TLS certificates are now accepted.\n* Separated the send/receive headers for HMAC calculations.\n* Fixed a compilation problem with swig/perl/~FC6.\n* Fixed an issue with loading PEM CA certificates.\n\n!!__axhttpd__\n\n* Made //setuid()/setgid()// call an mconf option.\n* Made //chroot()// an mconf option. Default to //chdir()// instead.\n* Removed optional permissions checking.\n\n!@@bgcolor(#ff0000):color(#ffffff):Changes for 1.1.1@@\n\n!!__SSL Library__\n\n* AES should now work on 16bit processors (there was an alignment problem).\n* Various freed objects are cleared before freeing.\n* Header files now installed in ///usr/local/include/axTLS//.\n* -DCYGWIN replaced with -~DCONFIG_PLATFORM_CYGWIN (and the same for Solaris).\n* removed "-noextern" option in Swig. Fixed some other warnings in Win32.\n* SSLCTX changed to ~SSL_CTX (to be consistent with openssl). SSLCTX still exists for backwards compatibility.\n* malloc() and friends call abort() on failure.\n* Fixed a memory leak in directory listings.\n* Added openssl() compatibility functions.\n* Fixed Cygwin 'make install' issue.\n\n!!__axhttpd__\n\n* main.c now becomes axhttpd.c.\n* Header file issue fixed (in mime_types.c).\n* //chroot()// now used for better security.\n* Basic authentication implemented (via .htpasswd).\n* SSL access/denial protection implemented (via .htaccess).\n* Directory access protection implemented (via .htaccess).\n* Can now have more than one CGI file extension in mconf.\n* "~If-Modified-Since" request now handled properly.\n* Performance tweaks to remove //ssl_find()//.
[[Read Me]]
axTLS uses a BSD style license:\n\nCopyright (c) 2008, Cameron Rich All rights reserved.\n\nRedistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions are met:\n\nRedistributions of source code must retain the above copyright notice, this\nlist of conditions and the following disclaimer. Redistributions in binary\nform must reproduce the above copyright notice, this list of conditions and\nthe following disclaimer in the documentation and/or other materials\nprovided with the distribution. Neither the name of the axTLS Project nor\nthe names of its contributors may be used to endorse or promote products\nderived from this software without specific prior written permission. \n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"\nAND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\nIMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\nARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR\nANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\nDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR\nSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER\nCAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\nLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\nOUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH\nDAMAGE.
[[Read Me]] \n[[Changelog]]\n[[axhttpd]]\n[[License]]