pax_global_header00006660000000000000000000000064127466640260014527gustar00rootroot0000000000000052 comment=b69d3b745b5af9e5ccd4b9781407ab7e82076d6b certvalidator-0.11.1/000077500000000000000000000000001274666402600144525ustar00rootroot00000000000000certvalidator-0.11.1/.gitignore000066400000000000000000000001421274666402600164370ustar00rootroot00000000000000__pycache__/ *.pyc .python-version *.egg-info/ build/ dist/ tests/output/ .DS_Store .coverage .toxcertvalidator-0.11.1/.travis.yml000066400000000000000000000071051274666402600165660ustar00rootroot00000000000000sudo: false language: c branches: except: - /^[0-9]+\.[0-9]+\.[0-9]$/ matrix: include: - os: osx python: "2.6" env: TRAVIS_PYTHON_VERSION=2.6 - os: osx python: "2.7" env: TRAVIS_PYTHON_VERSION=2.7 - os: osx python: "3.5" env: TRAVIS_PYTHON_VERSION=3.5 - os: osx python: "pypy" env: TRAVIS_PYTHON_VERSION=pypy - os: linux language: python python: "2.6" - os: linux language: python python: "2.7" - os: linux language: python python: "3.2" - os: linux language: python python: "3.3" - os: linux language: python python: "3.4" - os: linux language: python python: "3.5" - os: linux language: python python: "pypy" install: - if [ "$TRAVIS_OS_NAME" == "osx" ]; then if [ "$TRAVIS_PYTHON_VERSION" == "pypy" ]; then brew update; brew install pypy; /usr/local/bin/pip_pypy install flake8; /usr/local/bin/pip_pypy install https://github.com/wbond/asn1crypto/archive/master.zip; /usr/local/bin/pip_pypy install https://github.com/wbond/oscrypto/archive/master.zip; export PYTHON_BIN=/usr/local/bin/pypy; else if [ "$TRAVIS_PYTHON_VERSION" == "3.5" ]; then brew update; brew install python3; /usr/local/bin/pip3 install flake8; /usr/local/bin/pip3 install https://github.com/wbond/asn1crypto/archive/master.zip; /usr/local/bin/pip3 install https://github.com/wbond/oscrypto/archive/master.zip; export PYTHON_BIN=/usr/local/bin/python3; else if [ "$TRAVIS_PYTHON_VERSION" == "2.7" ]; then curl --silent --show-error https://bootstrap.pypa.io/get-pip.py | sudo /usr/bin/python2.7; sudo /usr/bin/python2.7 -W ignore -c "import pip; pip.main(['--disable-pip-version-check', '--quiet', 'install', 'flake8'])"; sudo /usr/bin/python2.7 -W ignore -c "import pip; pip.main(['--disable-pip-version-check', '--quiet', 'install', 'https://github.com/wbond/asn1crypto/archive/master.zip'])"; sudo /usr/bin/python2.7 -W ignore -c "import pip; pip.main(['--disable-pip-version-check', '--quiet', 'install', 'https://github.com/wbond/oscrypto/archive/master.zip'])"; export PYTHON_BIN=/usr/bin/python2.7; else curl --silent --show-error --location -o asn1crypto-master.zip https://github.com/wbond/asn1crypto/archive/master.zip; unzip asn1crypto-master.zip; cd asn1crypto-master; sudo /usr/bin/python2.6 setup.py install clean; cd ..; curl --silent --show-error --location -o oscrypto-master.zip https://github.com/wbond/oscrypto/archive/master.zip; unzip oscrypto-master.zip; cd oscrypto-master; sudo /usr/bin/python2.6 setup.py install clean; cd ..; export PYTHON_BIN=/usr/bin/python2.6; fi fi fi else python -c "import sys,pip; pip.main(['install', '--upgrade', 'pip' + ('==7.1.2' if sys.version_info[0:2] == (3, 2) else '')])"; pip install flake8; pip install https://github.com/wbond/asn1crypto/archive/master.zip; pip install https://github.com/wbond/oscrypto/archive/master.zip; export PYTHON_BIN=python; fi script: - $PYTHON_BIN run.py ci certvalidator-0.11.1/LICENSE000066400000000000000000000020561274666402600154620ustar00rootroot00000000000000Copyright (c) 2015 Will Bond Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. certvalidator-0.11.1/appveyor.yml000066400000000000000000000201261274666402600170430ustar00rootroot00000000000000version: "{build}" skip_tags: true environment: matrix: - PYTHON: "C:\\Python26" PYTHON_ID: "26" PYTHON_EXE: python - PYTHON: "C:\\Python26-x64" PYTHON_ID: "26-x64" PYTHON_EXE: python - PYTHON: "C:\\Python27" PYTHON_ID: "27" PYTHON_EXE: python - PYTHON: "C:\\Python27-x64" PYTHON_ID: "27-x64" PYTHON_EXE: python - PYTHON: "C:\\Python33" PYTHON_ID: "33" PYTHON_EXE: python - PYTHON: "C:\\Python33-x64" PYTHON_ID: "33-x64" PYTHON_EXE: python - PYTHON: "C:\\pypy2-v5.3.1-win32" PYTHON_ID: "pypy" PYTHON_EXE: pypy install: - ps: |- $env:PYTMP = "${env:TMP}\py"; if (!(Test-Path "$env:PYTMP")) { New-Item -ItemType directory -Path "$env:PYTMP" | Out-Null; } [Byte[]] $geotrustCaBytes = 0x30,0x82,0x03,0x7C,0x30,0x82,0x02,0x64,0xA0,0x03,0x02,0x01,0x02, 0x02,0x10,0x18,0xAC,0xB5,0x6A,0xFD,0x69,0xB6,0x15,0x3A,0x63,0x6C,0xAF,0xDA,0xFA,0xC4,0xA1,0x30, 0x0D,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x01,0x05,0x05,0x00,0x30,0x58,0x31,0x0B,0x30, 0x09,0x06,0x03,0x55,0x04,0x06,0x13,0x02,0x55,0x53,0x31,0x16,0x30,0x14,0x06,0x03,0x55,0x04,0x0A, 0x13,0x0D,0x47,0x65,0x6F,0x54,0x72,0x75,0x73,0x74,0x20,0x49,0x6E,0x63,0x2E,0x31,0x31,0x30,0x2F, 0x06,0x03,0x55,0x04,0x03,0x13,0x28,0x47,0x65,0x6F,0x54,0x72,0x75,0x73,0x74,0x20,0x50,0x72,0x69, 0x6D,0x61,0x72,0x79,0x20,0x43,0x65,0x72,0x74,0x69,0x66,0x69,0x63,0x61,0x74,0x69,0x6F,0x6E,0x20, 0x41,0x75,0x74,0x68,0x6F,0x72,0x69,0x74,0x79,0x30,0x1E,0x17,0x0D,0x30,0x36,0x31,0x31,0x32,0x37, 0x30,0x30,0x30,0x30,0x30,0x30,0x5A,0x17,0x0D,0x33,0x36,0x30,0x37,0x31,0x36,0x32,0x33,0x35,0x39, 0x35,0x39,0x5A,0x30,0x58,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06,0x13,0x02,0x55,0x53,0x31, 0x16,0x30,0x14,0x06,0x03,0x55,0x04,0x0A,0x13,0x0D,0x47,0x65,0x6F,0x54,0x72,0x75,0x73,0x74,0x20, 0x49,0x6E,0x63,0x2E,0x31,0x31,0x30,0x2F,0x06,0x03,0x55,0x04,0x03,0x13,0x28,0x47,0x65,0x6F,0x54, 0x72,0x75,0x73,0x74,0x20,0x50,0x72,0x69,0x6D,0x61,0x72,0x79,0x20,0x43,0x65,0x72,0x74,0x69,0x66, 0x69,0x63,0x61,0x74,0x69,0x6F,0x6E,0x20,0x41,0x75,0x74,0x68,0x6F,0x72,0x69,0x74,0x79,0x30,0x82, 0x01,0x22,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x01,0x01,0x05,0x00,0x03,0x82, 0x01,0x0F,0x00,0x30,0x82,0x01,0x0A,0x02,0x82,0x01,0x01,0x00,0xBE,0xB8,0x15,0x7B,0xFF,0xD4,0x7C, 0x7D,0x67,0xAD,0x83,0x64,0x7B,0xC8,0x42,0x53,0x2D,0xDF,0xF6,0x84,0x08,0x20,0x61,0xD6,0x01,0x59, 0x6A,0x9C,0x44,0x11,0xAF,0xEF,0x76,0xFD,0x95,0x7E,0xCE,0x61,0x30,0xBB,0x7A,0x83,0x5F,0x02,0xBD, 0x01,0x66,0xCA,0xEE,0x15,0x8D,0x6F,0xA1,0x30,0x9C,0xBD,0xA1,0x85,0x9E,0x94,0x3A,0xF3,0x56,0x88, 0x00,0x31,0xCF,0xD8,0xEE,0x6A,0x96,0x02,0xD9,0xED,0x03,0x8C,0xFB,0x75,0x6D,0xE7,0xEA,0xB8,0x55, 0x16,0x05,0x16,0x9A,0xF4,0xE0,0x5E,0xB1,0x88,0xC0,0x64,0x85,0x5C,0x15,0x4D,0x88,0xC7,0xB7,0xBA, 0xE0,0x75,0xE9,0xAD,0x05,0x3D,0x9D,0xC7,0x89,0x48,0xE0,0xBB,0x28,0xC8,0x03,0xE1,0x30,0x93,0x64, 0x5E,0x52,0xC0,0x59,0x70,0x22,0x35,0x57,0x88,0x8A,0xF1,0x95,0x0A,0x83,0xD7,0xBC,0x31,0x73,0x01, 0x34,0xED,0xEF,0x46,0x71,0xE0,0x6B,0x02,0xA8,0x35,0x72,0x6B,0x97,0x9B,0x66,0xE0,0xCB,0x1C,0x79, 0x5F,0xD8,0x1A,0x04,0x68,0x1E,0x47,0x02,0xE6,0x9D,0x60,0xE2,0x36,0x97,0x01,0xDF,0xCE,0x35,0x92, 0xDF,0xBE,0x67,0xC7,0x6D,0x77,0x59,0x3B,0x8F,0x9D,0xD6,0x90,0x15,0x94,0xBC,0x42,0x34,0x10,0xC1, 0x39,0xF9,0xB1,0x27,0x3E,0x7E,0xD6,0x8A,0x75,0xC5,0xB2,0xAF,0x96,0xD3,0xA2,0xDE,0x9B,0xE4,0x98, 0xBE,0x7D,0xE1,0xE9,0x81,0xAD,0xB6,0x6F,0xFC,0xD7,0x0E,0xDA,0xE0,0x34,0xB0,0x0D,0x1A,0x77,0xE7, 0xE3,0x08,0x98,0xEF,0x58,0xFA,0x9C,0x84,0xB7,0x36,0xAF,0xC2,0xDF,0xAC,0xD2,0xF4,0x10,0x06,0x70, 0x71,0x35,0x02,0x03,0x01,0x00,0x01,0xA3,0x42,0x30,0x40,0x30,0x0F,0x06,0x03,0x55,0x1D,0x13,0x01, 0x01,0xFF,0x04,0x05,0x30,0x03,0x01,0x01,0xFF,0x30,0x0E,0x06,0x03,0x55,0x1D,0x0F,0x01,0x01,0xFF, 0x04,0x04,0x03,0x02,0x01,0x06,0x30,0x1D,0x06,0x03,0x55,0x1D,0x0E,0x04,0x16,0x04,0x14,0x2C,0xD5, 0x50,0x41,0x97,0x15,0x8B,0xF0,0x8F,0x36,0x61,0x5B,0x4A,0xFB,0x6B,0xD9,0x99,0xC9,0x33,0x92,0x30, 0x0D,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x01,0x05,0x05,0x00,0x03,0x82,0x01,0x01,0x00, 0x5A,0x70,0x7F,0x2C,0xDD,0xB7,0x34,0x4F,0xF5,0x86,0x51,0xA9,0x26,0xBE,0x4B,0xB8,0xAA,0xF1,0x71, 0x0D,0xDC,0x61,0xC7,0xA0,0xEA,0x34,0x1E,0x7A,0x77,0x0F,0x04,0x35,0xE8,0x27,0x8F,0x6C,0x90,0xBF, 0x91,0x16,0x24,0x46,0x3E,0x4A,0x4E,0xCE,0x2B,0x16,0xD5,0x0B,0x52,0x1D,0xFC,0x1F,0x67,0xA2,0x02, 0x45,0x31,0x4F,0xCE,0xF3,0xFA,0x03,0xA7,0x79,0x9D,0x53,0x6A,0xD9,0xDA,0x63,0x3A,0xF8,0x80,0xD7, 0xD3,0x99,0xE1,0xA5,0xE1,0xBE,0xD4,0x55,0x71,0x98,0x35,0x3A,0xBE,0x93,0xEA,0xAE,0xAD,0x42,0xB2, 0x90,0x6F,0xE0,0xFC,0x21,0x4D,0x35,0x63,0x33,0x89,0x49,0xD6,0x9B,0x4E,0xCA,0xC7,0xE7,0x4E,0x09, 0x00,0xF7,0xDA,0xC7,0xEF,0x99,0x62,0x99,0x77,0xB6,0x95,0x22,0x5E,0x8A,0xA0,0xAB,0xF4,0xB8,0x78, 0x98,0xCA,0x38,0x19,0x99,0xC9,0x72,0x9E,0x78,0xCD,0x4B,0xAC,0xAF,0x19,0xA0,0x73,0x12,0x2D,0xFC, 0xC2,0x41,0xBA,0x81,0x91,0xDA,0x16,0x5A,0x31,0xB7,0xF9,0xB4,0x71,0x80,0x12,0x48,0x99,0x72,0x73, 0x5A,0x59,0x53,0xC1,0x63,0x52,0x33,0xED,0xA7,0xC9,0xD2,0x39,0x02,0x70,0xFA,0xE0,0xB1,0x42,0x66, 0x29,0xAA,0x9B,0x51,0xED,0x30,0x54,0x22,0x14,0x5F,0xD9,0xAB,0x1D,0xC1,0xE4,0x94,0xF0,0xF8,0xF5, 0x2B,0xF7,0xEA,0xCA,0x78,0x46,0xD6,0xB8,0x91,0xFD,0xA6,0x0D,0x2B,0x1A,0x14,0x01,0x3E,0x80,0xF0, 0x42,0xA0,0x95,0x07,0x5E,0x6D,0xCD,0xCC,0x4B,0xA4,0x45,0x8D,0xAB,0x12,0xE8,0xB3,0xDE,0x5A,0xE5, 0xA0,0x7C,0xE8,0x0F,0x22,0x1D,0x5A,0xE9,0x59; $geotrustCa = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2; $geotrustCa.Import($geotrustCaBytes); $rootStore = Get-Item cert:\LocalMachine\Root; $rootStore.Open("ReadWrite"); $rootStore.Add($geotrustCa); $rootStore.Close(); if ("${env:PYTHON_ID}" -eq "pypy") { if (!(Test-Path "${env:PYTMP}\pypy2-v5.3.1-win32.zip")) { (New-Object Net.WebClient).DownloadFile('https://bitbucket.org/pypy/pypy/downloads/pypy2-v5.3.1-win32.zip', "${env:PYTMP}\pypy2-v5.3.1-win32.zip"); } 7z x -y "${env:PYTMP}\pypy2-v5.3.1-win32.zip" -oC:\ | Out-Null; if (!(Test-Path "${env:PYTMP}\get-pip.py")) { (New-Object Net.WebClient).DownloadFile('https://bootstrap.pypa.io/get-pip.py', "${env:PYTMP}\get-pip.py"); } & "${env:PYTHON}\pypy.exe" "${env:PYTMP}\get-pip.py"; & "${env:PYTHON}\bin\pip.exe" --disable-pip-version-check --quiet install flake8; & "${env:PYTHON}\bin\pip.exe" --disable-pip-version-check --quiet install https://github.com/wbond/asn1crypto/archive/master.zip; & "${env:PYTHON}\bin\pip.exe" --disable-pip-version-check --quiet install https://github.com/wbond/oscrypto/archive/master.zip; } elseif ("${env:PYTHON_ID}" -eq "26" -or "${env:PYTHON_ID}" -eq "26-x64") { # Skip flake8 for 2.6 since pip, flake8 and pycodestyle have all deprecated support for it (New-Object Net.WebClient).DownloadFile('https://github.com/wbond/asn1crypto/archive/master.zip', "${env:TMP}\asn1crypto-master.zip"); 7z x -y "${env:TMP}\asn1crypto-master.zip" -o"${env:TMP}\" | Out-Null; (New-Object Net.WebClient).DownloadFile('https://github.com/wbond/oscrypto/archive/master.zip', "${env:TMP}\oscrypto-master.zip"); 7z x -y "${env:TMP}\oscrypto-master.zip" -o"${env:TMP}\" | Out-Null; $origDir = "$pwd"; cd "${env:TMP}\asn1crypto-master\"; & "${env:PYTHON}\python.exe" setup.py install clean; cd "${env:TMP}\oscrypto-master\"; & "${env:PYTHON}\python.exe" setup.py install clean; cd "$origDir"; } else { & "${env:PYTHON}\Scripts\pip.exe" --disable-pip-version-check --quiet install flake8; & "${env:PYTHON}\Scripts\pip.exe" --disable-pip-version-check --quiet install https://github.com/wbond/asn1crypto/archive/master.zip; & "${env:PYTHON}\Scripts\pip.exe" --disable-pip-version-check --quiet install https://github.com/wbond/oscrypto/archive/master.zip; } - "SET PATH=%PYTHON%;%PATH%" cache: - '%TMP%\py\' build: off test_script: - cmd: "%PYTHON_EXE% run.py ci" certvalidator-0.11.1/certvalidator/000077500000000000000000000000001274666402600173155ustar00rootroot00000000000000certvalidator-0.11.1/certvalidator/__init__.py000066400000000000000000000174411274666402600214350ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function from asn1crypto import pem from asn1crypto.x509 import Certificate from .context import ValidationContext from .errors import ValidationError, PathBuildingError, InvalidCertificateError from .validate import validate_path, validate_tls_hostname, validate_usage from ._errors import pretty_message from ._types import type_name, str_cls, byte_cls from ._version import __version__, __version_info__ __all__ = [ '__version__', '__version_info__', 'CertificateValidator', 'ValidationContext', ] class CertificateValidator(): # A certvalidator.context.ValidationContext object _context = None # An asn1crypto.x509.Certificate object _certificate = None # A certvalidator.path.ValidationPath object - only set once validated _path = None def __init__(self, end_entity_cert, intermediate_certs=None, validation_context=None): """ :param end_entity_cert: An asn1crypto.x509.Certificate object or a byte string of the DER or PEM-encoded X.509 end-entity certificate to validate :param intermediate_certs: None or a list of asn1crypto.x509.Certificate objects or a byte string of a DER or PEM-encoded X.509 certificate. Used in constructing certificate paths for validation. :param validation_context: A certvalidator.context.ValidationContext() object that controls validation options """ if not isinstance(end_entity_cert, Certificate): if not isinstance(end_entity_cert, byte_cls): raise TypeError(pretty_message( ''' end_entity_cert must be a byte string or an instance of asn1crypto.x509.Certificate, not %s ''', type_name(end_entity_cert) )) if pem.detect(end_entity_cert): _, _, end_entity_cert = pem.unarmor(end_entity_cert) end_entity_cert = Certificate.load(end_entity_cert) if validation_context is None: validation_context = ValidationContext() if not isinstance(validation_context, ValidationContext): raise TypeError(pretty_message( ''' validation_context must be an instance of certvalidator.context.ValidationContext, not %s ''', type_name(validation_context) )) if intermediate_certs is not None: certificate_registry = validation_context.certificate_registry for intermediate_cert in intermediate_certs: certificate_registry.add_other_cert(intermediate_cert) self._context = validation_context self._certificate = end_entity_cert def _validate_path(self): """ Builds possible certificate paths and validates them until a valid one is found, or all fail. :raises: certvalidator.errors.PathValidationError - when an error occurs validating the path certvalidator.errors.RevokedError - when the certificate or another certificate in its path has been revoked """ if self._path is not None: return exceptions = [] if self._certificate.hash_algo in self._context.weak_hash_algos: raise InvalidCertificateError(pretty_message( ''' The X.509 certificate provided has a signature using the weak hash algorithm %s ''', self._certificate.hash_algo )) try: paths = self._context.certificate_registry.build_paths(self._certificate) except (PathBuildingError) as e: if self._certificate.self_signed in set(['yes', 'maybe']): raise InvalidCertificateError(pretty_message( ''' The X.509 certificate provided is self-signed - "%s" ''', self._certificate.subject.human_friendly )) raise for candidate_path in paths: try: validate_path(self._context, candidate_path) self._path = candidate_path return except (ValidationError) as e: exceptions.append(e) if len(exceptions) == 1: raise exceptions[0] non_signature_exception = None for exception in exceptions: if 'signature' not in str_cls(exception): non_signature_exception = exception if non_signature_exception: raise non_signature_exception raise exceptions[0] def validate_usage(self, key_usage, extended_key_usage=None, extended_optional=False): """ Validates the certificate path and that the certificate is valid for the key usage and extended key usage purposes specified. :param key_usage: A set of unicode strings of the required key usage purposes. Valid values include: - "digital_signature" - "non_repudiation" - "key_encipherment" - "data_encipherment" - "key_agreement" - "key_cert_sign" - "crl_sign" - "encipher_only" - "decipher_only" :param extended_key_usage: A set of unicode strings of the required extended key usage purposes. These must be either dotted number OIDs, or one of the following extended key usage purposes: - "server_auth" - "client_auth" - "code_signing" - "email_protection" - "ipsec_end_system" - "ipsec_tunnel" - "ipsec_user" - "time_stamping" - "ocsp_signing" - "wireless_access_points" An example of a dotted number OID: - "1.3.6.1.5.5.7.3.1" :param extended_optional: A bool - if the extended_key_usage extension may be ommited and still considered valid :raises: certvalidator.errors.PathValidationError - when an error occurs validating the path certvalidator.errors.RevokedError - when the certificate or another certificate in its path has been revoked certvalidator.errors.InvalidCertificateError - when the certificate is not valid for the usages specified :return: A certvalidator.path.ValidationPath object of the validated certificate validation path """ self._validate_path() validate_usage( self._context, self._certificate, key_usage, extended_key_usage, extended_optional ) return self._path def validate_tls(self, hostname): """ Validates the certificate path, that the certificate is valid for the hostname provided and that the certificate is valid for the purpose of a TLS connection. :param hostname: A unicode string of the TLS server hostname :raises: certvalidator.errors.PathValidationError - when an error occurs validating the path certvalidator.errors.RevokedError - when the certificate or another certificate in its path has been revoked certvalidator.errors.InvalidCertificateError - when the certificate is not valid for TLS or the hostname :return: A certvalidator.path.ValidationPath object of the validated certificate validation path """ self._validate_path() validate_tls_hostname(self._context, self._certificate, hostname) return self._path certvalidator-0.11.1/certvalidator/_errors.py000066400000000000000000000015611274666402600213450ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import re import textwrap def pretty_message(string, *params): """ Takes a multi-line string and does the following: - dedents - converts newlines with text before and after into a single line - strips leading and trailing whitespace :param string: The string to format :param *params: Params to interpolate into the string :return: The formatted string """ output = textwrap.dedent(string) # Unwrap lines, taking into account bulleted lists, ordered lists and # underlines consisting of = signs if output.find('\n') != -1: output = re.sub('(?<=\\S)\n(?=[^ \n\t\\d\\*\\-=])', ' ', output) if params: output = output % params output = output.strip() return output certvalidator-0.11.1/certvalidator/_types.py000066400000000000000000000013011274666402600211650ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import inspect import sys if sys.version_info < (3,): str_cls = unicode # noqa byte_cls = str else: str_cls = str byte_cls = bytes def type_name(value): """ Returns a user-readable name for the type of an object :param value: A value to get the type name of :return: A unicode string of the object's type name """ if inspect.isclass(value): cls = value else: cls = value.__class__ if cls.__module__ in set(['builtins', '__builtin__']): return cls.__name__ return '%s.%s' % (cls.__module__, cls.__name__) certvalidator-0.11.1/certvalidator/_version.py000066400000000000000000000002321274666402600215100ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function __version__ = '0.11.1' __version_info__ = (0, 11, 1) certvalidator-0.11.1/certvalidator/context.py000066400000000000000000000541711274666402600213630ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import socket import sys from datetime import datetime import binascii from asn1crypto import crl, ocsp from asn1crypto.util import timezone from . import ocsp_client, crl_client from ._errors import pretty_message from ._types import type_name, byte_cls, str_cls from .errors import SoftFailError from .path import ValidationPath from .registry import CertificateRegistry if sys.version_info < (3,): from urllib2 import URLError else: from urllib.error import URLError class ValidationContext(): # A certvalidator.registry.CertificateRegistry() object certificate_registry = None # A set of unicode strings of hash algorithms to be considered weak. Valid # options include: "md2", "md5", "sha1" weak_hash_algos = None # A set of byte strings of the SHA-1 hashes of certificates that are whitelisted _whitelisted_certs = None # A dict with keys being an asn1crypto.x509.Certificate.signature byte # string of a certificate. Each value is a # certvalidator.path.ValidationPath object of a fully-validated path # for that certificate. _validate_map = None # A dict with keys being an asn1crypto.crl.CertificateList.signature byte # string of a CRL. Each value is an asn1crypto.x509.Certificate object of # the validated issuer of the CRL. _crl_issuer_map = None # A dict with keys being an asn1crypto.x509.Certificate.issuer_serial byte # string of the certificate the CRLs are for. Each value is a list # asn1crypto.crl.CertificateList objects. _fetched_crls = None # A dict with keys being an asn1crypto.x509.Certificate.issuer_serial byte # string of the certificate the responses are for. Each value is a list # asn1crypto.ocsp.OCSPResponse objects. _fetched_ocsps = None # If CRLs or OCSP responses can be fetched from the network _allow_fetching = False # A list of asn1crypto.crl.CertificateList objects _crls = None # A list of asn1crypto.ocsp.OCSPResponse objects _ocsps = None # A dict with keys being an asn1crypto.x509.Certificate.issuer_serial byte # string of the certificate, and the value being an # asn1crypto.x509.Certificate object containing a certificate from a CRL # or OCSP response that was fetched. Only certificates not already part of # the .certificate_registry are added to this dict. _revocation_certs = None # A dict of keyword params to pass to certificates.crl_client.fetch() _crl_fetch_params = None # A dict of keyword params to pass to certificates.ocsp_client.fetch() _ocsp_fetch_params = None # Any exceptions that were ignored while the revocation_mode is "soft-fail" _soft_fail_exceptions = None # A datetime.datetime object to use when checking the validity # period of certificates moment = None # By default, any CRLs or OCSP responses that are passed to the constructor # are chccked. If _allow_fetching is True, any CRLs or OCSP responses that # can be downloaded will also be checked. The next two attributes change # that behavior. # A bool - if all CRL and OCSP revocation checks should be skipped, even if # provided to the constructor. This is strictly used internally, and if for # the purpose of skipping revocation checks on an single-purpose OCSP # responder certificate. _skip_revocation_checks = None # A unicode string of the revocation mode - "soft-fail", "hard-fail", # or "require" _revocation_mode = None def __init__(self, trust_roots=None, extra_trust_roots=None, other_certs=None, whitelisted_certs=None, moment=None, allow_fetching=False, crls=None, crl_fetch_params=None, ocsps=None, ocsp_fetch_params=None, revocation_mode="soft-fail", weak_hash_algos=None): """ :param trust_roots: If the operating system's trust list should not be used, instead pass a list of byte strings containing DER or PEM-encoded X.509 certificates, or asn1crypto.x509.Certificate objects. These certificates will be used as the trust roots for the path being built. :param extra_trust_roots: If the operating system's trust list should be used, but augmented with one or more extra certificates. This should be a list of byte strings containing DER or PEM-encoded X.509 certificates, or asn1crypto.x509.Certificate objects. :param other_certs: A list of byte strings containing DER or PEM-encoded X.509 certificates, or a list of asn1crypto.x509.Certificate objects. These other certs are usually provided by the service/item being validated. In TLS, these would be intermediate chain certs. :param whitelisted_certs: None or a list of byte strings or unicode strings of the SHA-1 fingerprint of one or more certificates. The fingerprint is a hex encoding of the SHA-1 byte string, optionally separated into pairs by spaces or colons. These whilelisted certificates will not be checked for validity dates. If one of the certificates is an end-entity certificate in a certificate path, any TLS hostname mismatches, key usage errors or extended key usage errors will also be ignored. :param moment: If certificate validation should be performed based on a date and time other than right now. A datetime.datetime object with a tzinfo value. If this parameter is specified, then the only way to check OCSP and CRL responses is to pass them via the crls and ocsps parameters. Can not be combined with allow_fetching=True. :param crls: None or a list/tuple of asn1crypto.crl.CertificateList objects of pre-fetched/cached CRLs to be utilized during validation of paths :param crl_fetch_params: None or a dict of keyword args to pass to certvalidator.crl_client.fetch() when fetching CRLs or associated certificates. Only applicable when allow_fetching=True. :param ocsps: None or a list/tuple of asn1crypto.ocsp.OCSPResponse objects of pre-fetched/cached OCSP responses to be utilized during validation of paths :param ocsp_fetch_params: None or a dict of keyword args to pass to certvalidator.ocsp_client.fetch() when fetching OSCP responses. Only applicable when allow_fetching=True. :param allow_fetching: A bool - if HTTP requests should be made to fetch CRLs and OCSP responses. If this is True and certificates contain the location of a CRL or OCSP responder, an HTTP request will be made to obtain information for revocation checking. :param revocation_mode: A unicode string of the revocation mode to use: "soft-fail" (the default), "hard-fail" or "require". In "soft-fail" mode, any sort of error in fetching or locating revocation information is ignored. In "hard-fail" mode, if a certificate has a known CRL or OCSP and it can not be checked, it is considered a revocation failure. In "require" mode, every certificate in the certificate path must have a CRL or OCSP. :param weak_hash_algos: A set of unicode strings of hash algorithms that should be considered weak. Valid options include: "md2", "md5", "sha1" """ if crls is not None: if not isinstance(crls, (list, tuple)): raise TypeError(pretty_message( ''' crls must be a list of byte strings or asn1crypto.crl.CertificateList objects, not %s ''', type_name(crls) )) new_crls = [] for crl_ in crls: if not isinstance(crl_, crl.CertificateList): if not isinstance(crl_, byte_cls): raise TypeError(pretty_message( ''' crls must be a list of byte strings or asn1crypto.crl.CertificateList objects, not %s ''', type_name(crl_) )) crl_ = crl.CertificateList.load(crl_) new_crls.append(crl_) crls = new_crls if ocsps is not None: if not isinstance(ocsps, list): raise TypeError(pretty_message( ''' ocsps must be a list of byte strings or asn1crypto.ocsp.OCSPResponse objects, not %s ''', type_name(ocsps) )) new_ocsps = [] for ocsp_ in ocsps: if not isinstance(ocsp_, ocsp.OCSPResponse): if not isinstance(ocsp_, byte_cls): raise TypeError(pretty_message( ''' ocsps must be a list of byte strings or asn1crypto.ocsp.OCSPResponse objects, not %s ''', type_name(ocsp_) )) ocsp_ = ocsp.OCSPResponse.load(ocsp_) new_ocsps.append(ocsp_) ocsps = new_ocsps if moment is not None: if allow_fetching: raise ValueError(pretty_message( ''' allow_fetching must be False when moment is specified ''' )) elif not allow_fetching and crls is None and ocsps is None and revocation_mode != "soft-fail": raise ValueError(pretty_message( ''' revocation_mode is "%s" and allow_fetching is False, however crls and ocsps are both None, meaning that no validation can happen ''' )) if crl_fetch_params is not None and not isinstance(crl_fetch_params, dict): raise TypeError(pretty_message( ''' crl_fetch_params must be a dict, not %s ''', type_name(crl_fetch_params) )) if ocsp_fetch_params is not None and not isinstance(ocsp_fetch_params, dict): raise TypeError(pretty_message( ''' ocsp_fetch_params must be a dict, not %s ''', type_name(ocsp_fetch_params) )) if moment is None: moment = datetime.now(timezone.utc) else: if not isinstance(moment, datetime): raise TypeError(pretty_message( ''' moment must be a datetime object, not %s ''', type_name(moment) )) if moment.utcoffset() is None: raise ValueError(pretty_message( ''' moment is a naive datetime object, meaning the tzinfo attribute is not set to a valid timezone ''' )) if revocation_mode not in set(['soft-fail', 'hard-fail', 'require']): raise ValueError(pretty_message( ''' revocation_mode must be one of "soft-fail", "hard-fail", "require", not %s ''', repr(revocation_mode) )) self._whitelisted_certs = set() if whitelisted_certs is not None: for whitelisted_cert in whitelisted_certs: if isinstance(whitelisted_cert, byte_cls): whitelisted_cert = whitelisted_cert.decode('ascii') if not isinstance(whitelisted_cert, str_cls): raise TypeError(pretty_message( ''' whitelisted_certs must contain only byte strings or unicode strings, not %s ''', type_name(whitelisted_cert) )) # Allow users to copy from various OS and browser info dialogs, # some of which separate the hex char pairs via spaces or colons whitelisted_cert = whitelisted_cert.replace(' ', '').replace(':', '') self._whitelisted_certs.add( binascii.unhexlify(whitelisted_cert.encode('ascii')) ) if weak_hash_algos is not None: if not isinstance(weak_hash_algos, set): raise TypeError(pretty_message( ''' weak_hash_algos must be a set of unicode strings, not %s ''', type_name(weak_hash_algos) )) unsupported_hash_algos = weak_hash_algos - set(['md2', 'md5', 'sha1']) if unsupported_hash_algos: raise ValueError(pretty_message( ''' weak_hash_algos must contain only the unicode strings "md2", "md5", "sha1", not %s ''', repr(unsupported_hash_algos) )) else: weak_hash_algos = set(['md2', 'md5']) self.certificate_registry = CertificateRegistry( trust_roots, extra_trust_roots, other_certs ) self.moment = moment self._validate_map = {} self._crl_issuer_map = {} self._fetched_crls = {} self._fetched_ocsps = {} self._revocation_certs = {} self._crls = [] if crls: self._crls = crls self._ocsps = [] if ocsps: self._ocsps = ocsps for ocsp_response in ocsps: self._extract_ocsp_certs(ocsp_response) self._crl_fetch_params = crl_fetch_params or {} self._ocsp_fetch_params = ocsp_fetch_params or {} self._allow_fetching = bool(allow_fetching) self._skip_revocation_checks = False self._revocation_mode = revocation_mode self._soft_fail_exceptions = [] self.weak_hash_algos = weak_hash_algos @property def crls(self): """ A list of all cached asn1crypto.crl.CertificateList objects """ if not self._allow_fetching: return self._crls output = [] for issuer_serial in self._fetched_crls: output.extend(self._fetched_crls[issuer_serial]) return output @property def ocsps(self): """ A list of all cached asn1crypto.ocsp.OCSPResponse objects """ if not self._allow_fetching: return self._ocsps output = [] for issuer_serial in self._fetched_ocsps: output.extend(self._fetched_ocsps[issuer_serial]) return output @property def new_revocation_certs(self): """ A list of newly-fetched asn1crypto.x509.Certificate objects that were obtained from OCSP responses and CRLs """ return list(self._revocation_certs.values()) @property def soft_fail_exceptions(self): """ A list of soft-fail exceptions that were ignored during checks """ return self._soft_fail_exceptions @property def revocation_mode(self): """ A unicode string of the revocation checking mode: "soft-fail", "hard-fail", or "require" """ return self._revocation_mode def is_whitelisted(self, cert): """ Checks to see if a certificate has been whitelisted :param cert: An asn1crypto.x509.Certificate object :return: A bool - if the certificate is whitelisted """ return cert.sha1 in self._whitelisted_certs def retrieve_crls(self, cert): """ :param cert: An asn1crypto.x509.Certificate object :param path: A certvalidator.path.ValidationPath object for the cert :return: A list of asn1crypto.crl.CertificateList objects """ if not self._allow_fetching: return self._crls if cert.issuer_serial not in self._fetched_crls: try: crls = crl_client.fetch( cert, **self._crl_fetch_params ) self._fetched_crls[cert.issuer_serial] = crls for crl_ in crls: try: certs = crl_client.fetch_certs( crl_, user_agent=self._crl_fetch_params.get('user_agent'), timeout=self._crl_fetch_params.get('timeout') ) for cert_ in certs: if self.certificate_registry.add_other_cert(cert_): self._revocation_certs[cert_.issuer_serial] = cert_ except (URLError, socket.error): pass except (URLError, socket.error) as e: self._fetched_crls[cert.issuer_serial] = [] if self._revocation_mode == "soft-fail": self._soft_fail_exceptions.append(e) raise SoftFailError() else: raise return self._fetched_crls[cert.issuer_serial] def retrieve_ocsps(self, cert, issuer): """ :param cert: An asn1crypto.x509.Certificate object :param issuer: An asn1crypto.x509.Certificate object of cert's issuer :return: A list of asn1crypto.ocsp.OCSPResponse objects """ if not self._allow_fetching: return self._ocsps if cert.issuer_serial not in self._fetched_ocsps: try: ocsp_response = ocsp_client.fetch( cert, issuer, **self._ocsp_fetch_params ) self._fetched_ocsps[cert.issuer_serial] = [ocsp_response] # Responses can contain certificates that are useful in validating the # response itself. We can use these since they will be validated using # the local trust roots. self._extract_ocsp_certs(ocsp_response) except (URLError, socket.error) as e: self._fetched_ocsps[cert.issuer_serial] = [] if self._revocation_mode == "soft-fail": self._soft_fail_exceptions.append(e) raise SoftFailError() else: raise return self._fetched_ocsps[cert.issuer_serial] def _extract_ocsp_certs(self, ocsp_response): """ Extracts any certificates included with an OCSP response and adds them to the certificate registry :param ocsp_response: An asn1crypto.ocsp.OCSPResponse object to look for certs inside of """ status = ocsp_response['response_status'].native if status == 'successful': response_bytes = ocsp_response['response_bytes'] if response_bytes['response_type'].native == 'basic_ocsp_response': response = response_bytes['response'].parsed if response['certs']: for other_cert in response['certs']: if self.certificate_registry.add_other_cert(other_cert): self._revocation_certs[other_cert.issuer_serial] = other_cert def record_validation(self, cert, path): """ Records that a certificate has been validated, along with the path that was used for validation. This helps reduce duplicate work when validating a ceritifcate and related resources such as CRLs and OCSPs. :param cert: An ans1crypto.x509.Certificate object :param path: A certvalidator.path.ValidationPath object """ self._validate_map[cert.signature] = path def check_validation(self, cert): """ Checks to see if a certificate has been validated, and if so, returns the ValidationPath used to validate it. :param cert: An asn1crypto.x509.Certificate object :return: None if not validated, or a certvalidator.path.ValidationPath object of the validation path """ # CA certs are automatically trusted since they are from the trust list if self.certificate_registry.is_ca(cert) and cert.signature not in self._validate_map: self._validate_map[cert.signature] = ValidationPath(cert) return self._validate_map.get(cert.signature) def clear_validation(self, cert): """ Clears the record that a certificate has been validated :param cert: An ans1crypto.x509.Certificate object """ if cert.signature in self._validate_map: del self._validate_map[cert.signature] def record_crl_issuer(self, certificate_list, cert): """ Records the certificate that issued a certificate list. Used to reduce processing code when dealing with self-issued certificates and multiple CRLs. :param certificate_list: An ans1crypto.crl.CertificateList object :param cert: An ans1crypto.x509.Certificate object """ self._crl_issuer_map[certificate_list.signature] = cert def check_crl_issuer(self, certificate_list): """ Checks to see if the certificate that signed a certificate list has been found :param certificate_list: An ans1crypto.crl.CertificateList object :return: None if not found, or an asn1crypto.x509.Certificate object of the issuer """ return self._crl_issuer_map.get(certificate_list.signature) certvalidator-0.11.1/certvalidator/crl_client.py000066400000000000000000000112471274666402600220120ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import sys from asn1crypto import crl, x509, cms, pem, util from ._types import str_cls, type_name from ._version import __version__ if sys.version_info < (3,): from urllib2 import Request, urlopen else: from urllib.request import Request, urlopen def fetch(cert, use_deltas=True, user_agent=None, timeout=10): """ Fetches the CRLs for a certificate :param cert: An asn1cyrpto.x509.Certificate object to get the CRL for :param use_deltas: A boolean indicating if delta CRLs should be fetched :param user_agent: The HTTP user agent to use when requesting the CRL. If None, a default is used in the format "certvalidation 1.0.0". :param timeout: The number of seconds after which an HTTP request should timeout :raises: urllib.error.URLError/urllib2.URLError - when a URL/HTTP error occurs socket.error - when a socket error occurs :return: A list asn1crypto.crl.CertificateList objects """ if not isinstance(cert, x509.Certificate): raise TypeError('cert must be an instance of asn1crypto.x509.Certificate, not %s' % type_name(cert)) if user_agent is None: user_agent = 'certvalidator %s' % __version__ elif not isinstance(user_agent, str_cls): raise TypeError('user_agent must be a unicode string, not %s' % type_name(user_agent)) output = [] sources = cert.crl_distribution_points if use_deltas: sources.extend(cert.delta_crl_distribution_points) for distribution_point in sources: url = distribution_point.url output.append(_grab_crl(user_agent, url, timeout)) return output def _grab_crl(user_agent, url, timeout): """ Fetches a CRL and parses it :param user_agent: A unicode string of the user agent to use when fetching the URL :param url: A unicode string of the URL to fetch the CRL from :param timeout: The number of seconds after which an HTTP request should timeout :return: An asn1crypto.crl.CertificateList object """ if sys.version_info < (3,): url = util.iri_to_uri(url) request = Request(url) request.add_header(b'Accept', b'application/pkix-crl') request.add_header(b'User-Agent', user_agent.encode('iso-8859-1')) response = urlopen(request, None, timeout) data = response.read() if pem.detect(data): _, _, data = pem.unarmor(data) return crl.CertificateList.load(data) def fetch_certs(certificate_list, user_agent=None, timeout=10): """ Fetches certificates from the authority information access extension of an asn1crypto.crl.CertificateList object and places them into the cert registry. :param certificate_list: An asn1crypto.crl.CertificateList object :param user_agent: The HTTP user agent to use when requesting the CRL. If None, a default is used in the format "certvalidation 1.0.0". :param timeout: The number of seconds after which an HTTP request should timeout :raises: urllib.error.URLError/urllib2.URLError - when a URL/HTTP error occurs socket.error - when a socket error occurs :return: A list of any asn1crypto.x509.Certificate objects that were fetched """ output = [] if user_agent is None: user_agent = 'certvalidator %s' % __version__ elif not isinstance(user_agent, str_cls): raise TypeError('user_agent must be a unicode string, not %s' % type_name(user_agent)) for url in certificate_list.issuer_cert_urls: if sys.version_info < (3,): url = util.iri_to_uri(url) request = Request(url) request.add_header(b'Accept', b'application/pkix-cert,application/pkcs7-mime') request.add_header(b'User-Agent', user_agent.encode('iso-8859-1')) response = urlopen(request, None, timeout) content_type = response.headers['Content-Type'].strip() response_data = response.read() if content_type == 'application/pkix-cert': output.append(x509.Certificate.load(response_data)) elif content_type == 'application/pkcs7-mime': signed_data = cms.SignedData.load(response_data) if isinstance(signed_data['certificates'], cms.CertificateSet): for cert_choice in signed_data['certificates']: if cert_choice.name == 'certificate': output.append(cert_choice.chosen) else: raise ValueError('Unknown content type of %s when fetching issuer certificate for CRL' % repr(content_type)) return output certvalidator-0.11.1/certvalidator/errors.py000066400000000000000000000017231274666402600212060ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function class PathError(Exception): pass class PathBuildingError(PathError): pass class DuplicateCertificateError(PathError): pass class CRLValidationError(Exception): pass class CRLNoMatchesError(CRLValidationError): pass class CRLValidationIndeterminateError(CRLValidationError): @property def failures(self): return self.args[1] class OCSPValidationError(Exception): pass class OCSPNoMatchesError(OCSPValidationError): pass class OCSPValidationIndeterminateError(OCSPValidationError): @property def failures(self): return self.args[1] class SoftFailError(Exception): pass class ValidationError(Exception): pass class PathValidationError(ValidationError): pass class RevokedError(PathValidationError): pass class InvalidCertificateError(PathValidationError): pass certvalidator-0.11.1/certvalidator/ocsp_client.py000066400000000000000000000110601274666402600221670ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import os import sys from asn1crypto import core, ocsp, x509, algos, util from . import errors from ._types import str_cls, type_name from ._version import __version__ if sys.version_info < (3,): from urllib2 import Request, urlopen, URLError else: from urllib.request import Request, urlopen from urllib.error import URLError def fetch(cert, issuer, hash_algo='sha1', nonce=True, user_agent=None, timeout=10): """ Fetches an OCSP response for a certificate :param cert: An asn1cyrpto.x509.Certificate object to get an OCSP reponse for :param issuer: An asn1crypto.x509.Certificate object that is the issuer of cert :param hash_algo: A unicode string of "sha1" or "sha256" :param nonce: A boolean - if the nonce extension should be used to prevent replay attacks :param user_agent: The HTTP user agent to use when requesting the OCSP response. If None, a default is used in the format "certvalidation 1.0.0". :param timeout: The number of seconds after which an HTTP request should timeout :raises: urllib.error.URLError/urllib2.URLError - when a URL/HTTP error occurs socket.error - when a socket error occurs :return: An asn1crypto.ocsp.OCSPResponse object """ if not isinstance(cert, x509.Certificate): raise TypeError('cert must be an instance of asn1crypto.x509.Certificate, not %s' % type_name(cert)) if not isinstance(issuer, x509.Certificate): raise TypeError('issuer must be an instance of asn1crypto.x509.Certificate, not %s' % type_name(issuer)) if hash_algo not in set(['sha1', 'sha256']): raise ValueError('hash_algo must be one of "sha1", "sha256", not %s' % repr(hash_algo)) if not isinstance(nonce, bool): raise TypeError('nonce must be a bool, not %s' % type_name(nonce)) if user_agent is None: user_agent = 'certvalidator %s' % __version__ elif not isinstance(user_agent, str_cls): raise TypeError('user_agent must be a unicode string, not %s' % type_name(user_agent)) cert_id = ocsp.CertId({ 'hash_algorithm': algos.DigestAlgorithm({'algorithm': hash_algo}), 'issuer_name_hash': getattr(cert.issuer, hash_algo), 'issuer_key_hash': getattr(issuer.public_key, hash_algo), 'serial_number': cert.serial_number, }) request = ocsp.Request({ 'req_cert': cert_id, }) tbs_request = ocsp.TBSRequest({ 'request_list': ocsp.Requests([request]), }) if nonce: nonce_extension = ocsp.TBSRequestExtension({ 'extn_id': 'nonce', 'critical': False, 'extn_value': core.OctetString(core.OctetString(os.urandom(16)).dump()) }) tbs_request['request_extensions'] = ocsp.TBSRequestExtensions([nonce_extension]) ocsp_request = ocsp.OCSPRequest({ 'tbs_request': tbs_request, }) last_e = None for ocsp_url in cert.ocsp_urls: try: if sys.version_info < (3,): ocsp_url = util.iri_to_uri(ocsp_url) request = Request(ocsp_url) _add_header(request, 'Accept', 'application/ocsp-response') _add_header(request, 'Content-Type', 'application/ocsp-request') _add_header(request, 'User-Agent', user_agent) response = urlopen(request, ocsp_request.dump(), timeout) ocsp_response = ocsp.OCSPResponse.load(response.read()) request_nonce = ocsp_request.nonce_value response_nonce = ocsp_response.nonce_value if request_nonce and response_nonce and request_nonce.native != response_nonce.native: raise errors.OCSPValidationError( 'Unable to verify OCSP response since the request and response nonces do not match' ) return ocsp_response except (URLError) as e: last_e = e raise last_e def _add_header(request, name, value): """ Adds a header to a urllib2/urllib.request Request object, ensuring values are encoded appropriately based on the version of Python :param request: An instance of urllib2.Request or urllib.request.Request :param name: A unicode string of the header name :param value: A unicode string of the header value """ if sys.version_info < (3,): name = name.encode('iso-8859-1') value = value.encode('iso-8859-1') request.add_header(name, value) certvalidator-0.11.1/certvalidator/path.py000066400000000000000000000151711274666402600206300ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function from asn1crypto import pem, x509 from ._errors import pretty_message from ._types import byte_cls, type_name from .errors import DuplicateCertificateError class ValidationPath(): """ Represents a path going towards an end-entity certificate """ # A list of asn1crypto.x509.Certificate objects, starting with a trust root # and chaining to an end-entity certificate _certs = None # A set of asn1crypto.x509.Certificate.issuer_serial byte strings of # certificates that are already in ._certs _cert_hashes = None def __init__(self, end_entity_cert=None): """ :param end_entity_cert: An asn1crypto.x509.Certificate object for the end-entity certificate """ self._certs = [] self._cert_hashes = set() if end_entity_cert: self.prepend(end_entity_cert) @property def first(self): """ Returns the current beginning of the path - for a path to be complete, this certificate should be a trust root :return: The first asn1crypto.x509.Certificate object in the path """ return self._certs[0] def find_issuer(self, cert): """ Return the issuer of the cert specified, as defined by this path :param cert: An asn1crypto.x509.Certificate object to get the issuer of :raises: LookupError - when the issuer of the certificate could not be found :return: An asn1crypto.x509.Certificate object of the issuer """ for entry in self: if entry.subject == cert.issuer: if entry.key_identifier and cert.authority_key_identifier: if entry.key_identifier == cert.authority_key_identifier: return entry else: return entry raise LookupError('Unable to find the issuer of the certificate specified') def truncate_to(self, cert): """ Remove all certificates in the path after the cert specified :param cert: An asn1crypto.x509.Certificate object to find :raises: LookupError - when the certificate could not be found :return: The current ValidationPath object, for chaining """ cert_index = None for index, entry in enumerate(self): if entry.issuer_serial == cert.issuer_serial: cert_index = index break if cert_index is None: raise LookupError('Unable to find the certificate specified') while len(self) > cert_index + 1: self.pop() return self def truncate_to_issuer(self, cert): """ Remove all certificates in the path after the issuer of the cert specified, as defined by this path :param cert: An asn1crypto.x509.Certificate object to find the issuer of :raises: LookupError - when the issuer of the certificate could not be found :return: The current ValidationPath object, for chaining """ issuer_index = None for index, entry in enumerate(self): if entry.subject == cert.issuer: if entry.key_identifier and cert.authority_key_identifier: if entry.key_identifier == cert.authority_key_identifier: issuer_index = index break else: issuer_index = index break if issuer_index is None: raise LookupError('Unable to find the issuer of the certificate specified') while len(self) > issuer_index + 1: self.pop() return self def copy(self): """ Creates a copy of this path :return: A ValidationPath object """ copy = self.__class__() copy._certs = self._certs[:] copy._cert_hashes = self._cert_hashes.copy() return copy def pop(self): """ Removes the last certificate from the path :return: The current ValidationPath object, for chaining """ last_cert = self._certs.pop() self._cert_hashes.remove(last_cert.issuer_serial) return self def append(self, cert): """ Appends a cert to the path. This should be a cert issued by the last cert in the path. :param cert: An asn1crypto.x509.Certificate object :return: The current ValidationPath object, for chaining """ if not isinstance(cert, x509.Certificate): if not isinstance(cert, byte_cls): raise TypeError(pretty_message( ''' cert must be a byte string or an asn1crypto.x509.Certificate object, not %s ''', type_name(cert) )) if pem.detect(cert): _, _, cert = pem.unarmor(cert) cert = x509.Certificate.load(cert) if cert.issuer_serial in self._cert_hashes: raise DuplicateCertificateError() self._cert_hashes.add(cert.issuer_serial) self._certs.append(cert) return self def prepend(self, cert): """ Prepends a cert to the path. This should be the issuer of the previously prepended cert. :param cert: An asn1crypto.x509.Certificate object or a byte string :return: The current ValidationPath object, for chaining """ if not isinstance(cert, x509.Certificate): if not isinstance(cert, byte_cls): raise TypeError(pretty_message( ''' cert must be a byte string or an asn1crypto.x509.Certificate object, not %s ''', type_name(cert) )) if pem.detect(cert): _, _, cert = pem.unarmor(cert) cert = x509.Certificate.load(cert) if cert.issuer_serial in self._cert_hashes: raise DuplicateCertificateError() self._cert_hashes.add(cert.issuer_serial) self._certs.insert(0, cert) return self def __len__(self): return len(self._certs) def __getitem__(self, key): return self._certs[key] def __iter__(self): return iter(self._certs) def __eq__(self, other): return self._certs == other._certs certvalidator-0.11.1/certvalidator/registry.py000066400000000000000000000326751274666402600215540ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function from asn1crypto import pem, x509 from oscrypto import trust_list from ._errors import pretty_message from ._types import byte_cls, type_name from .errors import PathBuildingError, DuplicateCertificateError from .path import ValidationPath class CertificateRegistry(): """ Contains certificate lists used to build validation paths """ # A dict with keys being asn1crypto.x509.Certificate.Name.hashable byte # string. Each value is a list of asn1crypto.x509.Certificate objects. _subject_map = None # A dict with keys being asn1crypto.x509.Certificate.key_identifier byte # string. Each value is an asn1crypto.x509.Certificate object. _key_identifier_map = None # A dict with keys being asn1crypto.x509.Certificate.signature byte string. # Each value is a bool - if the certificate is a CA cert. _ca_lookup = None def __init__(self, trust_roots=None, extra_trust_roots=None, other_certs=None): """ :param trust_roots: If the operating system's trust list should not be used, instead pass a list of byte strings containing DER or PEM-encoded X.509 certificates, or asn1crypto.x509.Certificate objects. These certificates will be used as the trust roots for the path being built. :param extra_trust_roots: If the operating system's trust list should be used, but augmented with one or more extra certificates. This should be a list of byte strings containing DER or PEM-encoded X.509 certificates, or asn1crypto.x509.Certificate objects. :param other_certs: A list of byte strings containing DER or PEM-encoded X.509 certificates, or a list of asn1crypto.x509.Certificate objects. These other certs are usually provided by the service/item being validated. In SSL, these would be intermediate chain certs. """ if trust_roots is not None and not isinstance(trust_roots, list): raise TypeError(pretty_message( ''' trust_roots must be a list of byte strings or asn1crypto.x509.Certificate objects, not %s ''', type_name(trust_roots) )) if extra_trust_roots is not None and not isinstance(extra_trust_roots, list): raise TypeError(pretty_message( ''' extra_trust_roots must be a list of byte strings or asn1crypto.x509.Certificate objects, not %s ''', type_name(extra_trust_roots) )) if other_certs is not None and not isinstance(other_certs, list): raise TypeError(pretty_message( ''' other_certs must be a list of byte strings or asn1crypto.x509.Certificate objects, not %s ''', type_name(other_certs) )) if other_certs is None: other_certs = [] else: other_certs = self._validate_unarmor(other_certs, 'other_certs') if trust_roots is None: trust_roots = [e[0] for e in trust_list.get_list()] else: trust_roots = self._validate_unarmor(trust_roots, 'trust_roots') if extra_trust_roots is not None: trust_roots.extend(self._validate_unarmor(extra_trust_roots, 'extra_trust_roots')) self._subject_map = {} self._key_identifier_map = {} self._ca_lookup = {} for trust_root in trust_roots: hashable = trust_root.subject.hashable if hashable not in self._subject_map: self._subject_map[hashable] = [] self._subject_map[hashable].append(trust_root) if trust_root.key_identifier: self._key_identifier_map[trust_root.key_identifier] = trust_root self._ca_lookup[trust_root.signature] = True for other_cert in other_certs: hashable = other_cert.subject.hashable if hashable not in self._subject_map: self._subject_map[hashable] = [] self._subject_map[hashable].append(other_cert) if other_cert.key_identifier: self._key_identifier_map[other_cert.key_identifier] = other_cert def _validate_unarmor(self, certs, var_name): """ Takes a list of byte strings or asn1crypto.x509.Certificates objects, validates and loads them while unarmoring any PEM-encoded contents :param certs: A list of byte strings or asn1crypto.x509.Certificate objects :param var_name: A unicode variable name to use in any TypeError exceptions :return: A list of asn1crypto.x509.Certificate objects """ output = [] for cert in certs: if isinstance(cert, x509.Certificate): output.append(cert) else: if not isinstance(cert, byte_cls): raise TypeError(pretty_message( ''' %s must contain only byte strings or asn1crypto.x509.Certificate objects, not %s ''', var_name, type_name(cert) )) if pem.detect(cert): _, _, cert = pem.unarmor(cert) output.append(x509.Certificate.load(cert)) return output def is_ca(self, cert): """ Checks if a certificate is in the list of CA certs in this registry :param cert: An asn1crypto.x509.Certificate object :return: A boolean - if the certificate is in the CA list """ return self._ca_lookup.get(cert.signature, False) def add_other_cert(self, cert): """ Allows adding an "other" cert that is obtained from doing revocation check via OCSP or CRL, or some other method :param cert: An asn1crypto.x509.Certificate object or a byte string of a DER or PEM-encoded certificate :return: A boolean indicating if the certificate was added - will return False if the certificate was already present """ if not isinstance(cert, x509.Certificate): if not isinstance(cert, byte_cls): raise TypeError(pretty_message( ''' cert must be a byte string or an instance of asn1crypto.x509.Certificate, not %s ''', type_name(cert) )) if pem.detect(cert): _, _, cert = pem.unarmor(cert) cert = x509.Certificate.load(cert) hashable = cert.subject.hashable if hashable not in self._subject_map: self._subject_map[hashable] = [] # Don't add the cert if we already have it else: serial_number = cert.serial_number for existing_cert in self._subject_map[hashable]: if existing_cert.serial_number == serial_number: return False self._subject_map[hashable].append(cert) if cert.key_identifier: self._key_identifier_map[cert.key_identifier] = cert else: self._key_identifier_map[cert.public_key.sha1] = cert return True def retrieve_by_key_identifier(self, key_identifier): """ Retrieves a cert via its key identifier :param key_identifier: A byte string of the key identifier :return: None or an asn1crypto.x509.Certificate object """ if not isinstance(key_identifier, byte_cls): raise TypeError(pretty_message( ''' key_identifier must be a byte string, not %s ''', type_name(key_identifier) )) return self._key_identifier_map.get(key_identifier) def retrieve_by_name(self, name, first_certificate=None): """ Retrieves a list certs via their subject name :param name: An asn1crypto.x509.Name object :param first_certificate: An asn1crypto.x509.Certificate object that if found, should be placed first in the result list :return: A list of asn1crypto.x509.Certificate objects """ if not isinstance(name, x509.Name): raise TypeError(pretty_message( ''' name must be an instance of asn1crypto.x509.Name, not %s ''', type_name(name) )) if first_certificate and not isinstance(first_certificate, x509.Certificate): raise TypeError(pretty_message( ''' first_certificate must be an instance of asn1crypto.x509.Certificate, not %s ''', type_name(first_certificate) )) hashable = name.hashable if hashable not in self._subject_map: return [] certs = self._subject_map[hashable] first = None output = [] for cert in certs: if first_certificate and first_certificate.sha256 == cert.sha256: first = cert else: output.append(cert) if first: output.insert(0, first) return output def build_paths(self, end_entity_cert): """ Builds a list of ValidationPath objects from a certificate in the operating system trust store to the end-entity certificate :param end_entity_cert: A byte string of a DER or PEM-encoded X.509 certificate, or an instance of asn1crypto.x509.Certificate :return: A list of certvalidator.path.ValidationPath objects that represent the possible paths from the end-entity certificate to one of the CA certs. """ if not isinstance(end_entity_cert, byte_cls) and not isinstance(end_entity_cert, x509.Certificate): raise TypeError(pretty_message( ''' end_entity_cert must be a byte string or an instance of asn1crypto.x509.Certificate, not %s ''', type_name(end_entity_cert) )) if isinstance(end_entity_cert, byte_cls): if pem.detect(end_entity_cert): _, _, end_entity_cert = pem.unarmor(end_entity_cert) end_entity_cert = x509.Certificate.load(end_entity_cert) path = ValidationPath(end_entity_cert) paths = [] failed_paths = [] self._walk_issuers(path, paths, failed_paths) if len(paths) == 0: cert_name = end_entity_cert.subject.human_friendly missing_issuer_name = failed_paths[0].first.issuer.human_friendly raise PathBuildingError(pretty_message( ''' Unable to build a validation path for the certificate "%s" - no issuer matching "%s" was found ''', cert_name, missing_issuer_name )) return paths def _walk_issuers(self, path, paths, failed_paths): """ Recursively looks through the list of known certificates for the issuer of the certificate specified, stopping once the certificate in question is one contained within the CA certs list :param path: A ValidationPath object representing the current traversal of possible paths :param paths: A list of completed ValidationPath objects. This is mutated as results are found. :param failed_paths: A list of certvalidator.path.ValidationPath objects that failed due to no matching issuer before reaching a certificate from the CA certs list """ if path.first.signature in self._ca_lookup: paths.append(path) return new_branches = 0 for issuer in self._possible_issuers(path.first): try: self._walk_issuers(path.copy().prepend(issuer), paths, failed_paths) new_branches += 1 except (DuplicateCertificateError): pass if not new_branches: failed_paths.append(path) def _possible_issuers(self, cert): """ Returns a generator that will list all possible issuers for the cert :param cert: An asn1crypto.x509.Certificate object to find the issuer of """ issuer_hashable = cert.issuer.hashable if issuer_hashable not in self._subject_map: return for issuer in self._subject_map[issuer_hashable]: # Info from the authority key identifier extension can be used to # eliminate possible options when multiple keys with the same # subject exist, such as during a transition, or with cross-signing. if cert.authority_key_identifier and issuer.key_identifier: if cert.authority_key_identifier != issuer.key_identifier: continue elif cert.authority_issuer_serial: if cert.authority_issuer_serial != issuer.issuer_serial: continue yield issuer certvalidator-0.11.1/certvalidator/validate.py000066400000000000000000002167501274666402600214730ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function from asn1crypto import x509, crl from oscrypto import asymmetric import oscrypto.errors from ._errors import pretty_message from ._types import str_cls, type_name from .context import ValidationContext from .errors import ( CRLNoMatchesError, CRLValidationError, CRLValidationIndeterminateError, InvalidCertificateError, OCSPNoMatchesError, OCSPValidationIndeterminateError, PathValidationError, RevokedError, SoftFailError, ) from .path import ValidationPath def validate_path(validation_context, path): """ Validates the path using the algorithm from https://tools.ietf.org/html/rfc5280#section-6.1, with the exception that name constraints are not checked or enforced. Critical extensions on the end-entity certificate are not validated and are left up to the consuming application to process and/or fail on. :param validation_context: A certvalidator.context.ValidationContext object to use for configuring validation behavior :param path: A certvalidator.path.ValidationPath object of the path to validate :raises: certvalidator.errors.PathValidationError - when an error occurs validating the path certvalidator.errors.RevokedError - when the certificate or another certificate in its path has been revoked :return: The final certificate in the path - an instance of asn1crypto.x509.Certificate """ return _validate_path(validation_context, path) def validate_tls_hostname(validation_context, cert, hostname): """ Validates the end-entity certificate from a certvalidator.path.ValidationPath object to ensure that the certificate is valid for the hostname provided and that the certificate is valid for the purpose of a TLS connection. THE CERTIFICATE PATH MUST BE VALIDATED SEPARATELY VIA validate_path()! :param validation_context: A certvalidator.context.ValidationContext object to use for configuring validation behavior :param cert: An asn1crypto.x509.Certificate object returned from validate_path() :param hostname: A unicode string of the TLS server hostname :raises: certvalidator.errors.InvalidCertificateError - when the certificate is not valid for TLS or the hostname """ if not isinstance(validation_context, ValidationContext): raise TypeError(pretty_message( ''' validation_context must be an instance of certvalidator.context.ValidationContext, not %s ''', type_name(validation_context) )) if validation_context.is_whitelisted(cert): return if not cert.is_valid_domain_ip(hostname): raise InvalidCertificateError(pretty_message( ''' The X.509 certificate provided is not valid for %s. Valid hostnames include: %s ''', hostname, ', '.join(cert.valid_domains) )) bad_key_usage = cert.key_usage_value and 'digital_signature' not in cert.key_usage_value.native bad_ext_key_usage = cert.extended_key_usage_value and 'server_auth' not in cert.extended_key_usage_value.native if bad_key_usage or bad_ext_key_usage: raise InvalidCertificateError(pretty_message( ''' The X.509 certificate provided is not valid for securing TLS connections ''' )) def validate_usage(validation_context, cert, key_usage, extended_key_usage, extended_optional): """ Validates the end-entity certificate from a certvalidator.path.ValidationPath object to ensure that the certificate is valid for the key usage and extended key usage purposes specified. THE CERTIFICATE PATH MUST BE VALIDATED SEPARATELY VIA validate_path()! :param validation_context: A certvalidator.context.ValidationContext object to use for configuring validation behavior :param cert: An asn1crypto.x509.Certificate object returned from validate_path() :param key_usage: A set of unicode strings of the required key usage purposes :param extended_key_usage: A set of unicode strings of the required extended key usage purposes :param extended_optional: A bool - if the extended_key_usage extension may be omitted and still considered valid :raises: certvalidator.errors.InvalidCertificateError - when the certificate is not valid for the usages specified """ if not isinstance(validation_context, ValidationContext): raise TypeError(pretty_message( ''' validation_context must be an instance of certvalidator.context.ValidationContext, not %s ''', type_name(validation_context) )) if validation_context.is_whitelisted(cert): return if key_usage is None: key_usage = set() if extended_key_usage is None: extended_key_usage = set() if not isinstance(key_usage, set): raise TypeError(pretty_message( ''' key_usage must be a set of unicode strings, not %s ''', type_name(key_usage) )) if not isinstance(extended_key_usage, set): raise TypeError(pretty_message( ''' extended_key_usage must be a set of unicode strings, not %s ''', type_name(extended_key_usage) )) if not isinstance(extended_optional, bool): raise TypeError(pretty_message( ''' extended_optional must be a boolean, not %s ''', type_name(extended_optional) )) missing_key_usage = key_usage if cert.key_usage_value: missing_key_usage = key_usage - cert.key_usage_value.native missing_extended_key_usage = set() if extended_optional is False and not cert.extended_key_usage_value: missing_extended_key_usage = extended_key_usage elif cert.extended_key_usage_value is not None: missing_extended_key_usage = extended_key_usage - set(cert.extended_key_usage_value.native) if missing_key_usage or missing_extended_key_usage: plural = 's' if len(missing_key_usage | missing_extended_key_usage) > 1 else '' friendly_purposes = [] for purpose in sorted(missing_key_usage | missing_extended_key_usage): friendly_purposes.append(purpose.replace('_', ' ')) raise InvalidCertificateError(pretty_message( ''' The X.509 certificate provided is not valid for the purpose%s of %s ''', plural, ', '.join(friendly_purposes) )) def _validate_path(validation_context, path, end_entity_name_override=None): """ Internal copy of validate_path() that allows overriding the name of the end-entity certificate as used in exception messages. This functionality is used during chain validation when dealing with indirect CRLs issuer or OCSP responder certificates. :param validation_context: A certvalidator.context.ValidationContext object to use for configuring validation behavior :param path: A certvalidator.path.ValidationPath object of the path to validate :param end_entity_name_override: A unicode string of the name to use for the final certificate in the path. This is necessary when dealing with indirect CRL issuers or OCSP responder certificates. :return: The final certificate in the path - an instance of asn1crypto.x509.Certificate """ if not isinstance(path, ValidationPath): raise TypeError(pretty_message( ''' path must be an instance of certvalidator.path.ValidationPath, not %s ''', type_name(path) )) if not isinstance(validation_context, ValidationContext): raise TypeError(pretty_message( ''' validation_context must be an instance of certvalidator.context.ValidationContext, not %s ''', type_name(validation_context) )) moment = validation_context.moment if end_entity_name_override is not None and not isinstance(end_entity_name_override, str_cls): raise TypeError(pretty_message( ''' end_entity_name_override must be a unicode string, not %s ''', type_name(end_entity_name_override) )) # Inputs trust_anchor = path.first # We skip the trust anchor when measuring the path since technically # the trust anchor is not part of the path path_length = len(path) - 1 # We don't accept any certificate policy or name constraint values as input # and instead just start allowing everything during initialization # Step 1: initialization # Step 1 a valid_policy_tree = PolicyTreeRoot('any_policy', set(), set(['any_policy'])) # Steps 1 b-c skipped since they relate to name constraints # Steps 1 d-f # We do not use initial-explicit-policy, initial-any-policy-inhibit or # initial-policy-mapping-inhibit, so they are all set to the path length + 1 explicit_policy = path_length + 1 inhibit_any_policy = path_length + 1 policy_mapping = path_length + 1 # Steps 1 g-i working_public_key = trust_anchor.public_key # Step 1 j working_issuer_name = trust_anchor.subject # Step 1 k max_path_length = path_length if trust_anchor.max_path_length is not None: max_path_length = trust_anchor.max_path_length # Step 2: basic processing index = 1 last_index = len(path) - 1 completed_path = ValidationPath(trust_anchor) validation_context.record_validation(trust_anchor, completed_path) cert = trust_anchor while index <= last_index: cert = path[index] # Step 2 a 1 signature_algo = cert['signature_algorithm'].signature_algo hash_algo = cert['signature_algorithm'].hash_algo if hash_algo in validation_context.weak_hash_algos: raise PathValidationError(pretty_message( ''' The path could not be validated because the signature of %s uses the weak hash algorithm %s ''', _cert_type(index, last_index, end_entity_name_override, definite=True), hash_algo )) if signature_algo == 'rsassa_pkcs1v15': verify_func = asymmetric.rsa_pkcs1v15_verify elif signature_algo == 'dsa': verify_func = asymmetric.dsa_verify elif signature_algo == 'ecdsa': verify_func = asymmetric.ecdsa_verify else: raise PathValidationError(pretty_message( ''' The path could not be validated because the signature of %s uses the unsupported algorithm %s ''', _cert_type(index, last_index, end_entity_name_override, definite=True), signature_algo )) try: key_object = asymmetric.load_public_key(working_public_key) verify_func(key_object, cert['signature_value'].native, cert['tbs_certificate'].dump(), hash_algo) except (oscrypto.errors.SignatureError): raise PathValidationError(pretty_message( ''' The path could not be validated because the signature of %s could not be verified ''', _cert_type(index, last_index, end_entity_name_override, definite=True) )) # Step 2 a 2 if not validation_context.is_whitelisted(cert): validity = cert['tbs_certificate']['validity'] if moment < validity['not_before'].native: raise PathValidationError(pretty_message( ''' The path could not be validated because %s is not valid until %s ''', _cert_type(index, last_index, end_entity_name_override, definite=True), validity['not_before'].native.strftime('%Y-%m-%d %H:%M:%SZ') )) if moment > validity['not_after'].native: raise PathValidationError(pretty_message( ''' The path could not be validated because %s expired %s ''', _cert_type(index, last_index, end_entity_name_override, definite=True), validity['not_after'].native.strftime('%Y-%m-%d %H:%M:%SZ') )) # Step 2 a 3 - CRL/OCSP if not validation_context._skip_revocation_checks: status_good = False revocation_check_failed = False matched = False soft_fail = False failures = [] if cert.ocsp_urls or validation_context.revocation_mode == 'require': try: verify_ocsp_response( cert, path, validation_context, cert_description=_cert_type( index, last_index, end_entity_name_override, definite=True ), end_entity_name_override=end_entity_name_override ) status_good = True matched = True except (OCSPValidationIndeterminateError) as e: failures.extend([failure[0] for failure in e.failures]) revocation_check_failed = True matched = True except (SoftFailError): soft_fail = True except (OCSPNoMatchesError): pass if not status_good and (cert.crl_distribution_points or validation_context.revocation_mode == 'require'): try: cert_description = _cert_type(index, last_index, end_entity_name_override, definite=True) verify_crl( cert, path, validation_context, cert_description=cert_description, end_entity_name_override=end_entity_name_override ) revocation_check_failed = False status_good = True matched = True except (CRLValidationIndeterminateError) as e: failures.extend([failure[0] for failure in e.failures]) revocation_check_failed = True matched = True except (SoftFailError): soft_fail = True except (CRLNoMatchesError): pass if not soft_fail: if not matched and validation_context.revocation_mode == 'require': raise PathValidationError(pretty_message( ''' The path could not be validated because no revocation information could be found for %s ''', _cert_type(index, last_index, end_entity_name_override, definite=True) )) if not status_good and revocation_check_failed: raise PathValidationError(pretty_message( ''' The path could not be validated because the %s revocation checks failed: %s ''', _cert_type(index, last_index, end_entity_name_override), '; '.join(failures) )) # Step 2 a 4 if cert.issuer != working_issuer_name: raise PathValidationError(pretty_message( ''' The path could not be validated because the %s issuer name could not be matched ''', _cert_type(index, last_index, end_entity_name_override), )) # Steps 2 b-c skipped since they relate to name constraints # Steps 2 d if cert.certificate_policies_value and valid_policy_tree is not None: cert_any_policy = None cert_policy_identifiers = set() # Step 2 d 1 for policy in cert.certificate_policies_value: policy_identifier = policy['policy_identifier'].native if policy_identifier == 'any_policy': cert_any_policy = policy continue cert_policy_identifiers.add(policy_identifier) policy_qualifiers = policy['policy_qualifiers'] policy_id_match = False parent_any_policy = None # Step 2 d 1 i for node in valid_policy_tree.at_depth(index - 1): if node.valid_policy == 'any_policy': parent_any_policy = node if policy_identifier not in node.expected_policy_set: continue policy_id_match = True node.add_child( policy_identifier, policy_qualifiers, set([policy_identifier]) ) # Step 2 d 1 ii if not policy_id_match and parent_any_policy: parent_any_policy.add_child( policy_identifier, policy_qualifiers, set([policy_identifier]) ) # Step 2 d 2 if cert_any_policy and (inhibit_any_policy > 0 or (index < path_length and cert.self_issued)): for node in valid_policy_tree.at_depth(index - 1): for expected_policy_identifier in node.expected_policy_set: if expected_policy_identifier not in cert_policy_identifiers: node.add_child( expected_policy_identifier, cert_any_policy['policy_qualifiers'], set([expected_policy_identifier]) ) # Step 2 d 3 for node in valid_policy_tree.walk_up(index - 1): if not node.children: node.parent.remove_child(node) if len(valid_policy_tree.children) == 0: valid_policy_tree = None # Step 2 e if cert.certificate_policies_value is None: valid_policy_tree = None # Step 2 f if valid_policy_tree is None and explicit_policy <= 0: raise PathValidationError(pretty_message( ''' The path could not be validated because there is no valid set of policies for %s ''', _cert_type(index, last_index, end_entity_name_override, definite=True), )) if index != last_index: # Step 3: prepare for certificate index+1 if cert.policy_mappings_value: policy_map = {} for mapping in cert.policy_mappings_value: issuer_domain_policy = mapping['issuer_domain_policy'].native subject_domain_policy = mapping['subject_domain_policy'].native if issuer_domain_policy not in policy_map: policy_map[issuer_domain_policy] = set() policy_map[issuer_domain_policy].add(subject_domain_policy) # Step 3 a if issuer_domain_policy == 'any_policy' or subject_domain_policy == 'any_policy': raise PathValidationError(pretty_message( ''' The path could not be validated because %s contains a policy mapping for the "any policy" ''', _cert_type(index, last_index, end_entity_name_override, definite=True) )) # Step 3 b if valid_policy_tree is not None: for mapping in cert.policy_mappings_value: issuer_domain_policy = mapping['issuer_domain_policy'].native # Step 3 b 1 if policy_mapping > 0: issuer_domain_policy_match = False cert_any_policy = None for node in valid_policy_tree.at_depth(index): if node.valid_policy == 'any_policy': cert_any_policy = node if node.valid_policy == issuer_domain_policy: issuer_domain_policy_match = True node.expected_policy_set = policy_map[issuer_domain_policy] if not issuer_domain_policy_match and cert_any_policy: cert_any_policy.parent.add_child( issuer_domain_policy, cert_any_policy.qualifier_set, policy_map[issuer_domain_policy] ) # Step 3 b 2 elif policy_mapping == 0: for node in valid_policy_tree.at_depth(index): if node.valid_policy == issuer_domain_policy: node.parent.remove_child(node) for node in valid_policy_tree.walk_up(index - 1): if not node.children: node.parent.remove_child(node) if len(valid_policy_tree.children) == 0: valid_policy_tree = None # Step 3 c working_issuer_name = cert.subject # Steps 3 d-f # Handle inheritance of DSA parameters from a signing CA to the # next in the chain copy_params = None if cert.public_key.algorithm == 'dsa' and cert.public_key.hash_algo is None: if working_public_key.algorithm == 'dsa': copy_params = working_public_key['algorithm']['parameters'].copy() working_public_key = cert.public_key if copy_params: working_public_key['algorithm']['parameters'] = copy_params # Step 3 g skipped since it relates to name constraints # Step 3 h if not cert.self_issued: # Step 3 h 1 if explicit_policy != 0: explicit_policy -= 1 # Step 3 h 2 if policy_mapping != 0: policy_mapping -= 1 # Step 3 h 3 if inhibit_any_policy != 0: inhibit_any_policy -= 1 # Step 3 i if cert.policy_constraints_value: # Step 3 i 1 require_explicit_policy = cert.policy_constraints_value['require_explicit_policy'].native if require_explicit_policy is not None and require_explicit_policy < explicit_policy: explicit_policy = require_explicit_policy # Step 3 i 2 inhibit_policy_mapping = cert.policy_constraints_value['inhibit_policy_mapping'].native if inhibit_policy_mapping is not None and inhibit_policy_mapping < policy_mapping: policy_mapping = inhibit_policy_mapping # Step 3 j if cert.inhibit_any_policy_value: inhibit_any_policy = min(cert.inhibit_any_policy_value.native, inhibit_any_policy) # Step 3 k if not cert.ca: raise PathValidationError(pretty_message( ''' The path could not be validated because %s is not a CA ''', _cert_type(index, last_index, end_entity_name_override, definite=True) )) # Step 3 l if not cert.self_issued: if max_path_length == 0: raise PathValidationError(pretty_message( ''' The path could not be validated because it exceeds the maximum path length ''' )) max_path_length -= 1 # Step 3 m if cert.max_path_length is not None and cert.max_path_length < max_path_length: max_path_length = cert.max_path_length # Step 3 n if cert.key_usage_value and 'key_cert_sign' not in cert.key_usage_value.native: raise PathValidationError(pretty_message( ''' The path could not be validated because %s is not allowed to sign certificates ''', _cert_type(index, last_index, end_entity_name_override, definite=True) )) # Step 3 o # Check for critical unsupported extensions supported_extensions = set([ 'authority_information_access', 'authority_key_identifier', 'basic_constraints', 'crl_distribution_points', 'extended_key_usage', 'freshest_crl', 'key_identifier', 'key_usage', 'ocsp_no_check', 'certificate_policies', 'policy_mappings', 'policy_constraints', 'inhibit_any_policy', ]) unsupported_critical_extensions = cert.critical_extensions - supported_extensions if unsupported_critical_extensions: raise PathValidationError(pretty_message( ''' The path could not be validated because %s contains the following unsupported critical extension%s: %s ''', _cert_type(index, last_index, end_entity_name_override, definite=True), 's' if len(unsupported_critical_extensions) != 1 else '', ', '.join(sorted(unsupported_critical_extensions)), )) if validation_context: completed_path = completed_path.copy().append(cert) validation_context.record_validation(cert, completed_path) index += 1 # Step 4: wrap-up procedure # Step 4 a if explicit_policy != 0: explicit_policy -= 1 # Step 4 b if cert.policy_constraints_value: if cert.policy_constraints_value['require_explicit_policy'].native == 0: explicit_policy = 0 # Steps 4 c-e skipped since this method doesn't output it # Step 4 f skipped since this method defers that to the calling application # Step 4 g # Step 4 g i if valid_policy_tree is None: intersection = None # Step 4 g ii else: intersection = valid_policy_tree # Step 4 g iii is skipped since the initial policy set is always any_policy if explicit_policy == 0 and intersection is None: raise PathValidationError(pretty_message( ''' The path could not be validated because there is no valid set of policies for %s ''', _cert_type(last_index, last_index, end_entity_name_override, definite=True) )) return cert def _cert_type(index, last_index, end_entity_name_override, definite=False): """ :param index: An integer of the index of the certificate in the path :param last_index: An integer of the last index in the path :param end_entity_name_override: None or a unicode string of the name to use for the final certificate in the path. Used for indirect CRL issuer and OCSP responder certificates. :param definite: When returning the string "end-entity certificate", passing this flag as True will prepend "the " to the result :return: A unicode string describing the position of a certificate in the chain """ if index != last_index: return 'intermediate certificate %s' % index prefix = 'the ' if definite else '' if end_entity_name_override is not None: return prefix + end_entity_name_override return prefix + 'end-entity certificate' def _self_signed(cert): """ Determines if a certificate is self-signed :param cert: An asn1crypto.x509.Certificate object to check :return: A boolean - True if the certificate is self-signed, False otherwise """ self_signed = cert.self_signed if self_signed == 'yes': return True if self_signed == 'no': return False # In the case of "maybe", we have to check the signature signature_algo = cert['signature_algorithm'].signature_algo hash_algo = cert['signature_algorithm'].hash_algo if signature_algo == 'rsassa_pkcs1v15': verify_func = asymmetric.rsa_pkcs1v15_verify elif signature_algo == 'dsa': verify_func = asymmetric.dsa_verify elif signature_algo == 'ecdsa': verify_func = asymmetric.ecdsa_verify else: raise PathValidationError(pretty_message( ''' Unable to verify the signature of the certificate since it uses the unsupported algorithm %s ''', signature_algo )) try: key_object = asymmetric.load_certificate(cert) verify_func(key_object, cert['signature_value'].native, cert['tbs_certificate'].dump(), hash_algo) return True except (oscrypto.errors.SignatureError): return False def verify_ocsp_response(cert, path, validation_context, cert_description=None, end_entity_name_override=None): """ Verifies an OCSP response, checking to make sure the certificate has not been revoked. Fulfills the requirements of https://tools.ietf.org/html/rfc6960#section-3.2. :param cert: An asn1cyrpto.x509.Certificate object to verify the OCSP reponse for :param path: A certvalidator.path.ValidationPath object for the cert :param validation_context: A certvalidator.context.ValidationContext object to use for caching validation information :param cert_description: None or a unicode string containing a description of the certificate to be used in exception messages :param end_entity_name_override: None or a unicode string of the name to use for the end-entity certificate when including in exception messages :raises: certvalidator.errors.OCSPNoMatchesError - when none of the OCSP responses match the certificate certvalidator.errors.OCSPValidationIndeterminateError - when the OCSP response could not be verified certvalidator.errors.RevokedError - when the OCSP response indicates the certificate has been revoked """ if not isinstance(cert, x509.Certificate): raise TypeError(pretty_message( ''' cert must be an instance of asn1crypto.x509.Certificate, not %s ''', type_name(cert) )) if not isinstance(path, ValidationPath): raise TypeError(pretty_message( ''' path must be an instance of certvalidator.path.ValidationPath, not %s ''', type_name(path) )) if not isinstance(validation_context, ValidationContext): raise TypeError(pretty_message( ''' validation_context must be an instance of certvalidator.context.ValidationContext, not %s ''', type_name(validation_context) )) if cert_description is None: cert_description = 'the certificate' if not isinstance(cert_description, str_cls): raise TypeError(pretty_message( ''' cert_description must be a unicode string, not %s ''', type_name(cert_description) )) moment = validation_context.moment issuer = path.find_issuer(cert) certificate_registry = validation_context.certificate_registry failures = [] mismatch_failures = 0 ocsp_responses = validation_context.retrieve_ocsps(cert, issuer) for ocsp_response in ocsp_responses: # Make sure that we get a valid response back from the OCSP responder status = ocsp_response['response_status'].native if status != 'successful': mismatch_failures += 1 continue response_bytes = ocsp_response['response_bytes'] if response_bytes['response_type'].native != 'basic_ocsp_response': mismatch_failures += 1 continue response = response_bytes['response'].parsed tbs_response = response['tbs_response_data'] # With a valid response, now a check is performed to see if the response is # applicable for the cert and moment requested cert_response = tbs_response['responses'][0] response_cert_id = cert_response['cert_id'] issuer_hash_algo = response_cert_id['hash_algorithm']['algorithm'].native cert_issuer_name_hash = getattr(cert.issuer, issuer_hash_algo) cert_issuer_key_hash = getattr(issuer.public_key, issuer_hash_algo) key_hash_mismatch = response_cert_id['issuer_key_hash'].native != cert_issuer_key_hash name_mismatch = response_cert_id['issuer_name_hash'].native != cert_issuer_name_hash serial_mismatch = response_cert_id['serial_number'].native != cert.serial_number if (name_mismatch or serial_mismatch) and key_hash_mismatch: mismatch_failures += 1 continue if name_mismatch: failures.append(( 'OCSP response issuer name hash does not match', ocsp_response )) continue if serial_mismatch: failures.append(( 'OCSP response certificate serial number does not match', ocsp_response )) continue if key_hash_mismatch: failures.append(( 'OCSP response issuer key hash does not match', ocsp_response )) continue if moment < cert_response['this_update'].native: failures.append(( 'OCSP response is from after the validation time', ocsp_response )) continue if moment > cert_response['next_update'].native: failures.append(( 'OCSP response is from before the validation time', ocsp_response )) continue # To verify the response as legitimate, the responder cert must be located if tbs_response['responder_id'].name == 'by_key': key_identifier = tbs_response['responder_id'].native signing_cert = certificate_registry.retrieve_by_key_identifier(key_identifier) else: candidate_signing_certs = certificate_registry.retrieve_by_name( tbs_response['responder_id'].chosen, None ) signing_cert = candidate_signing_certs[0] if candidate_signing_certs else None if not signing_cert: failures.append(( pretty_message( ''' Unable to verify OCSP response since response signing certificate could not be located ''' ), ocsp_response )) continue # The responder cert has to have a valid path back to one of the trust roots if not certificate_registry.is_ca(signing_cert): signing_cert_paths = certificate_registry.build_paths(signing_cert) for signing_cert_path in signing_cert_paths: try: # Store the original revocation check value changed_revocation_flags = False skip_ocsp = signing_cert.ocsp_no_check_value is not None skip_ocsp = skip_ocsp or signing_cert_path == path if skip_ocsp and validation_context._skip_revocation_checks is False: changed_revocation_flags = True original_revocation_mode = validation_context.revocation_mode new_revocation_mode = "soft-fail" if original_revocation_mode == "soft-fail" else "hard-fail" validation_context._skip_revocation_checks = True validation_context._revocation_mode = new_revocation_mode if end_entity_name_override is None and signing_cert.sha256 != issuer.sha256: end_entity_name_override = cert_description + ' OCSP responder' _validate_path( validation_context, signing_cert_path, end_entity_name_override=end_entity_name_override ) signing_cert_issuer = signing_cert_path.find_issuer(signing_cert) break except (PathValidationError): continue finally: if changed_revocation_flags: validation_context._skip_revocation_checks = False validation_context._revocation_mode = original_revocation_mode else: failures.append(( pretty_message( ''' Unable to verify OCSP response since response signing certificate could not be validated ''' ), ocsp_response )) continue # If the cert signing the OCSP response is not the issuer, it must be issued # by the cert issuer and be valid for OCSP responses if issuer.issuer_serial != signing_cert.issuer_serial: if signing_cert_issuer.issuer_serial != issuer.issuer_serial: failures.append(( pretty_message( ''' Unable to verify OCSP response since response was signed by an unauthorized certificate ''' ), ocsp_response )) continue extended_key_usage = signing_cert.extended_key_usage_value if 'ocsp_signing' not in extended_key_usage.native: failures.append(( pretty_message( ''' Unable to verify OCSP response since response was signed by an unauthorized certificate ''' ), ocsp_response )) continue # Determine what algorithm was used to sign the response signature_algo = response['signature_algorithm'].signature_algo hash_algo = response['signature_algorithm'].hash_algo if signature_algo == 'rsassa_pkcs1v15': verify_func = asymmetric.rsa_pkcs1v15_verify elif signature_algo == 'dsa': verify_func = asymmetric.dsa_verify elif signature_algo == 'ecdsa': verify_func = asymmetric.ecdsa_verify else: failures.append(( pretty_message( ''' Unable to verify OCSP response since response signature uses the unsupported algorithm %s ''', signature_algo ), ocsp_response )) continue # Verify that the response was properly signed by the validated certificate try: key_object = asymmetric.load_certificate(signing_cert) verify_func(key_object, response['signature'].native, tbs_response.dump(), hash_algo) except (oscrypto.errors.SignatureError): failures.append(( 'Unable to verify OCSP response signature', ocsp_response )) continue # Finally check to see if the certificate has been revoked status = cert_response['cert_status'].name if status == 'good': return if status == 'revoked': revocation_info = cert_response['cert_status'].chosen reason = revocation_info['revocation_reason'].human_friendly date = revocation_info['revocation_time'].native.strftime('%Y-%m-%d') time = revocation_info['revocation_time'].native.strftime('%H:%M:%S') raise RevokedError(pretty_message( ''' OCSP response indicates %s was revoked at %s on %s, due to %s ''', cert_description, time, date, reason )) if mismatch_failures == len(ocsp_responses): raise OCSPNoMatchesError(pretty_message( ''' No OCSP responses were issued for %s ''', cert_description )) raise OCSPValidationIndeterminateError( pretty_message( ''' Unable to determine if %s is revoked due to insufficient information from OCSP responses ''', cert_description ), failures ) def verify_crl(cert, path, validation_context, use_deltas=True, cert_description=None, end_entity_name_override=None): """ Verifies a certificate against a list of CRLs, checking to make sure the certificate has not been revoked. Uses the algorithm from https://tools.ietf.org/html/rfc5280#section-6.3 as a basis, but the implementation differs to allow CRLs from unrecorded locations. :param cert: An asn1cyrpto.x509.Certificate object to check for in the CRLs :param path: A certvalidator.path.ValidationPath object of the cert's validation path :param certificate_lists: A list of asn1crypto.crl.CertificateList objects :param validation_context: A certvalidator.context.ValidationContext object to use for caching validation information :param use_deltas: A boolean indicating if delta CRLs should be used :param cert_description: A unicode string containing a description of the certificate to be used in exception messages :param end_entity_name_override: None or a unicode string of the name to use for the end-entity certificate when including in exception messages :raises: certvalidator.errors.CRLNoMatchesError - when none of the CRLs match the certificate certvalidator.errors.CRLValidationError - when any error occurs trying to verify the CertificateList certvalidator.errors.RevokedError - when the CRL indicates the certificate has been revoked """ if not isinstance(cert, x509.Certificate): raise TypeError(pretty_message( ''' cert must be an instance of asn1crypto.x509.Certificate, not %s ''', type_name(cert) )) if not isinstance(path, ValidationPath): raise TypeError(pretty_message( ''' path must be an instance of certvalidator.path.ValidationPath, not %s ''', type_name(path) )) if not isinstance(validation_context, ValidationContext): raise TypeError(pretty_message( ''' validation_context must be an instance of certvalidator.context.ValidationContext, not %s ''', type_name(validation_context) )) if cert_description is None: cert_description = 'the certificate' if not isinstance(cert_description, str_cls): raise TypeError(pretty_message( ''' cert_description must be a unicode string, not %s ''', type_name(cert_description) )) moment = validation_context.moment certificate_registry = validation_context.certificate_registry certificate_lists = validation_context.retrieve_crls(cert) cert_issuer = path.find_issuer(cert) complete_lists_by_issuer = {} delta_lists_by_issuer = {} for certificate_list in certificate_lists: issuer_hashable = certificate_list.issuer.hashable if certificate_list.delta_crl_indicator_value is None: if issuer_hashable not in complete_lists_by_issuer: complete_lists_by_issuer[issuer_hashable] = [] complete_lists_by_issuer[issuer_hashable].append(certificate_list) else: if issuer_hashable not in delta_lists_by_issuer: delta_lists_by_issuer[issuer_hashable] = [] delta_lists_by_issuer[issuer_hashable].append(certificate_list) # In the main loop, only complete CRLs are processed, so delta CRLs are # weeded out of the todo list crls_to_process = [] for issuer_crls in complete_lists_by_issuer.values(): crls_to_process.extend(issuer_crls) total_crls = len(crls_to_process) # Build a lookup table for the Distribution point objects associated with # an issuer name hashable distribution_point_map = {} sources = [cert.crl_distribution_points] if use_deltas: sources.extend(cert.delta_crl_distribution_points) for dp_list in sources: for distribution_point in dp_list: if isinstance(distribution_point['crl_issuer'], x509.GeneralNames): dp_name_hashes = [] for general_name in distribution_point['crl_issuer']: if general_name.name == 'directory_name': dp_name_hashes.append(general_name.chosen.hashable) else: dp_name_hashes = [cert.issuer.hashable] for dp_name_hash in dp_name_hashes: if dp_name_hash not in distribution_point_map: distribution_point_map[dp_name_hash] = [] distribution_point_map[dp_name_hash].append(distribution_point) valid_reasons = set([ 'key_compromise', 'ca_compromise', 'affiliation_changed', 'superseded', 'cessation_of_operation', 'certificate_hold', 'privilege_withdrawn', 'aa_compromise', ]) known_extensions = set([ 'issuer_alt_name', 'crl_number', 'delta_crl_indicator', 'issuing_distribution_point', 'authority_key_identifier', 'freshest_crl', 'authority_information_access', ]) checked_reasons = set() failures = [] issuer_failures = 0 while len(crls_to_process) > 0: certificate_list = crls_to_process.pop(0) crl_idp = certificate_list.issuing_distribution_point_value delta_certificate_list = None delta_crl_idp = None interim_reasons = set() crl_issuer = None crl_issuer_name = None is_indirect = False if crl_idp and crl_idp['indirect_crl'].native: is_indirect = True crl_idp_name = crl_idp['distribution_point'] if crl_idp_name: if crl_idp_name.name == 'full_name': crl_issuer_name = crl_idp_name.chosen[0].chosen else: crl_issuer_name = cert_issuer.subject.copy().chosen.append( crl_idp_name.chosen ) elif certificate_list.authority_key_identifier: tmp_crl_issuer = certificate_registry.retrieve_by_key_identifier( certificate_list.authority_key_identifier ) crl_issuer_name = tmp_crl_issuer.subject else: failures.append(( 'CRL is marked as an indirect CRL, but provides no ' 'mechanism for locating the CRL issuer certificate', certificate_list )) continue else: crl_issuer_name = certificate_list.issuer if not crl_issuer: crl_issuer = validation_context.check_crl_issuer(certificate_list) if not crl_issuer: candidate_crl_issuers = certificate_registry.retrieve_by_name(crl_issuer_name, cert_issuer) candidates_skipped = 0 signatures_failed = 0 unauthorized_certs = 0 if not candidate_crl_issuers and crl_issuer_name != certificate_list.issuer: candidate_crl_issuers = certificate_registry.retrieve_by_name(certificate_list.issuer, cert_issuer) for candidate_crl_issuer in candidate_crl_issuers: direct_issuer = candidate_crl_issuer.subject == cert_issuer.subject # In some cases an indirect CRL issuer is a certificate issued # by the certificate issuer. However, we need to ensure that # the candidate CRL issuer is not the certificate being checked, # otherwise we may be checking an incorrect CRL and produce # incorrect results. indirect_issuer = candidate_crl_issuer.issuer == cert_issuer.subject indirect_issuer = indirect_issuer and candidate_crl_issuer.sha256 != cert.sha256 if not direct_issuer and not indirect_issuer and not is_indirect: candidates_skipped += 1 continue # Step f candidate_crl_issuer_path = None if validation_context: candidate_crl_issuer_path = validation_context.check_validation(candidate_crl_issuer) if candidate_crl_issuer_path is None: candidate_crl_issuer_path = path.copy().truncate_to_issuer(candidate_crl_issuer) candidate_crl_issuer_path.append(candidate_crl_issuer) try: # Pre-emptively mark a path as validated to prevent recursion if validation_context: validation_context.record_validation(candidate_crl_issuer, candidate_crl_issuer_path) temp_override = end_entity_name_override if temp_override is None and candidate_crl_issuer.sha256 != cert_issuer.sha256: temp_override = cert_description + ' CRL issuer' _validate_path( validation_context, candidate_crl_issuer_path, end_entity_name_override=temp_override ) except (PathValidationError) as e: # If the validation did not work out, clear it if validation_context: validation_context.clear_validation(candidate_crl_issuer) # We let a revoked error fall through since step k will catch # it with a correct error message if isinstance(e, RevokedError): raise raise CRLValidationError('CRL issuer certificate path could not be validated') key_usage_value = candidate_crl_issuer.key_usage_value if key_usage_value and 'crl_sign' not in key_usage_value.native: unauthorized_certs += 1 continue try: # Step g _verify_signature(certificate_list, candidate_crl_issuer) crl_issuer = candidate_crl_issuer break except (CRLValidationError) as e: signatures_failed += 1 continue if crl_issuer is None: if candidates_skipped == len(candidate_crl_issuers): issuer_failures += 1 else: if signatures_failed == len(candidate_crl_issuers): failures.append(( 'CRL signature could not be verified', certificate_list )) elif unauthorized_certs == len(candidate_crl_issuers): failures.append(( 'The CRL issuer is not authorized to sign CRLs', certificate_list )) else: failures.append(( 'Unable to locate CRL issuer certificate', certificate_list )) continue else: validation_context.record_crl_issuer(certificate_list, crl_issuer) # Step b 1 has_dp_crl_issuer = False dp_match = False dps = cert.crl_distribution_points_value if dps: crl_issuer_general_name = x509.GeneralName( name='directory_name', value=crl_issuer.subject ) for dp in dps: if dp['crl_issuer']: has_dp_crl_issuer = True if crl_issuer_general_name in dp['crl_issuer']: dp_match = True same_issuer = crl_issuer.subject == cert_issuer.subject indirect_match = has_dp_crl_issuer and dp_match and is_indirect missing_idp = has_dp_crl_issuer and (not dp_match or not is_indirect) indirect_crl_issuer = crl_issuer.issuer == cert_issuer.subject if (not same_issuer and not indirect_match and not indirect_crl_issuer) or missing_idp: issuer_failures += 1 continue # Check to make sure the CRL is valid for the moment specified if moment < certificate_list['tbs_cert_list']['this_update'].native: failures.append(( 'CRL is from after the validation time', certificate_list )) continue if moment > certificate_list['tbs_cert_list']['next_update'].native: failures.append(( 'CRL should have been regenerated by the validation time', certificate_list )) continue # Step b 2 if crl_idp is not None: # Step b 2 i has_idp_name = False has_dp_name = False idp_dp_match = False idp_general_names = [] idp_dp_name = crl_idp['distribution_point'] if idp_dp_name: has_idp_name = True if idp_dp_name.name == 'full_name': for general_name in idp_dp_name.chosen: idp_general_names.append(general_name) else: inner_extended_issuer_name = crl_issuer.subject.copy() inner_extended_issuer_name.chosen.append(idp_dp_name.chosen.untag()) idp_general_names.append(x509.GeneralName( name='directory_name', value=inner_extended_issuer_name )) dps = cert.crl_distribution_points_value if dps: for dp in dps: if idp_dp_match: break dp_name = dp['distribution_point'] if dp_name: has_dp_name = True if dp_name.name == 'full_name': for general_name in dp_name.chosen: if general_name in idp_general_names: idp_dp_match = True break else: inner_extended_issuer_name = crl_issuer.subject.copy() inner_extended_issuer_name.chosen.append(dp_name.chosen.untag()) dp_extended_issuer_name = x509.GeneralName( name='directory_name', value=inner_extended_issuer_name ) if dp_extended_issuer_name in idp_general_names: idp_dp_match = True elif dp['crl_issuer']: has_dp_name = True for dp_crl_issuer_name in dp['crl_issuer']: if dp_crl_issuer_name in idp_general_names: idp_dp_match = True break else: # If there is no DP, we consider the CRL issuer name to be it has_dp_name = True general_name = x509.GeneralName( name='directory_name', value=crl_issuer_name ) if general_name in idp_general_names: idp_dp_match = True idp_dp_match_failed = has_idp_name and has_dp_name and not idp_dp_match if idp_dp_match_failed: failures.append(( pretty_message( ''' The CRL issuing distribution point extension does not share any names with the certificate CRL distribution point extension ''' ), certificate_list )) issuer_failures += 1 continue # Step b 2 ii if crl_idp['only_contains_user_certs'].native: if cert.basic_constraints_value and cert.basic_constraints_value['ca'].native: failures.append(( pretty_message( ''' CRL only contains end-entity certificates and certificate is a CA certificate ''' ), certificate_list )) continue # Step b 2 iii if crl_idp['only_contains_ca_certs'].native: if not cert.basic_constraints_value or cert.basic_constraints_value['ca'].native is False: failures.append(( pretty_message( ''' CRL only contains CA certificates and certificate is an end-entity certificate ''' ), certificate_list )) continue # Step b 2 iv if crl_idp['only_contains_attribute_certs'].native: failures.append(( 'CRL only contains attribute certificates', certificate_list )) continue # Step c if use_deltas and certificate_list.freshest_crl_value and len(certificate_list.freshest_crl_value) > 0: for candidate_delta_cl in delta_lists_by_issuer.get(crl_issuer_name.hashable, []): # Step c 1 if candidate_delta_cl.issuer != crl_issuer_name: continue # Step c 2 delta_crl_idp = candidate_delta_cl.issuing_distribution_point_value if (crl_idp is None and delta_crl_idp is not None) or (crl_idp is not None and delta_crl_idp is None): continue if crl_idp and crl_idp.native != delta_crl_idp.native: continue # Step c 3 if certificate_list.authority_key_identifier != candidate_delta_cl.authority_key_identifier: continue delta_certificate_list = candidate_delta_cl break # Step d idp_reasons = None if crl_idp and crl_idp['only_some_reasons'].native is not None: idp_reasons = crl_idp['only_some_reasons'].native reason_keys = None if idp_reasons: reason_keys = idp_reasons if reason_keys is None: interim_reasons = valid_reasons.copy() else: interim_reasons = reason_keys # Step e # We don't skip a CRL if it only contains reasons already checked since # a certificate issuer can self-issue a new cert that is used for CRLs if certificate_list.critical_extensions - known_extensions: failures.append(( 'One or more unrecognized critical extensions are present in ' 'the CRL', certificate_list )) continue if use_deltas and delta_certificate_list and delta_certificate_list.critical_extensions - known_extensions: failures.append(( 'One or more unrecognized critical extensions are present in ' 'the delta CRL', delta_certificate_list )) continue # Step h if use_deltas and delta_certificate_list: try: _verify_signature(delta_certificate_list, crl_issuer) except (CRLValidationError): failures.append(( 'Delta CRL signature could not be verified', certificate_list, delta_certificate_list )) continue if moment < delta_certificate_list['tbs_cert_list']['this_update'].native: failures.append(( 'Delta CRL is from after the validation time', certificate_list, delta_certificate_list )) continue if moment > delta_certificate_list['tbs_cert_list']['next_update'].native: failures.append(( 'Delta CRL is from before the validation time', certificate_list, delta_certificate_list )) continue # Step i revoked_reason = None revoked_date = None if use_deltas and delta_certificate_list: try: revoked_date, revoked_reason = _find_cert_in_list(cert, cert_issuer, delta_certificate_list, crl_issuer) except (NotImplementedError): failures.append(( 'One or more critical extensions are present in the CRL ' 'entry for the certificate', delta_certificate_list )) continue # Step j if revoked_reason is None: try: revoked_date, revoked_reason = _find_cert_in_list(cert, cert_issuer, certificate_list, crl_issuer) except (NotImplementedError): failures.append(( 'One or more critical extensions are present in the CRL ' 'entry for the certificate', certificate_list )) continue # Step k if revoked_reason and revoked_reason.native == 'remove_from_crl': revoked_reason = None revoked_date = None if revoked_reason: reason = revoked_reason.human_friendly date = revoked_date.native.strftime('%Y-%m-%d') time = revoked_date.native.strftime('%H:%M:%S') raise RevokedError(pretty_message( ''' CRL indicates %s was revoked at %s on %s, due to %s ''', cert_description, time, date, reason )) # Step l checked_reasons |= interim_reasons # CRLs should not include this value, but at least one of the examples # from the NIST test suite does checked_reasons -= set(['unused']) if checked_reasons != valid_reasons: if total_crls == issuer_failures: raise CRLNoMatchesError(pretty_message( ''' No CRLs were issued by the issuer of %s, or any indirect CRL issuer ''', cert_description )) if not failures: failures.append(( 'The available CRLs do not cover all revocation reasons', )) raise CRLValidationIndeterminateError( pretty_message( ''' Unable to determine if %s is revoked due to insufficient information from known CRLs ''', cert_description ), failures ) def _verify_signature(certificate_list, crl_issuer): """ Verifies the digital signature on an asn1crypto.crl.CertificateList object :param certificate_list: An asn1crypto.crl.CertificateList object :param crl_issuer: An asn1crypto.x509.Certificate object of the CRL issuer :raises: certvalidator.errors.CRLValidationError - when the signature is invalid or uses an unsupported algorithm """ signature_algo = certificate_list['signature_algorithm'].signature_algo hash_algo = certificate_list['signature_algorithm'].hash_algo if signature_algo == 'rsassa_pkcs1v15': verify_func = asymmetric.rsa_pkcs1v15_verify elif signature_algo == 'dsa': verify_func = asymmetric.dsa_verify elif signature_algo == 'ecdsa': verify_func = asymmetric.ecdsa_verify else: raise CRLValidationError(pretty_message( ''' Unable to verify the CertificateList since the signature uses the unsupported algorithm %s ''', signature_algo )) try: key_object = asymmetric.load_certificate(crl_issuer) verify_func( key_object, certificate_list['signature'].native, certificate_list['tbs_cert_list'].dump(), hash_algo ) except (oscrypto.errors.SignatureError): raise CRLValidationError('Unable to verify the signature of the CertificateList') def _find_cert_in_list(cert, issuer, certificate_list, crl_issuer): """ Looks for a cert in the list of revoked certificates :param cert: An asn1crypto.x509.Certificate object of the cert being checked :param issuer: An asn1crypto.x509.Certificate object of the cert issuer :param certificate_list: An ans1crypto.crl.CertificateList object to look in for the cert :param crl_issuer: An asn1crypto.x509.Certificate object of the CRL issuer :return: A tuple of (None, None) if not present, otherwise a tuple of (asn1crypto.x509.Time object, asn1crypto.crl.CRLReason object) representing the date/time the object was revoked and why """ revoked_certificates = certificate_list['tbs_cert_list']['revoked_certificates'] cert_serial = cert.serial_number issuer_name = issuer.subject known_extensions = set([ 'crl_reason', 'hold_instruction_code', 'invalidity_date', 'certificate_issuer' ]) last_issuer_name = crl_issuer.subject for revoked_cert in revoked_certificates: # If any unknown critical extensions, the entry can not be used if revoked_cert.critical_extensions - known_extensions: raise NotImplementedError() if revoked_cert.issuer_name and revoked_cert.issuer_name != last_issuer_name: last_issuer_name = revoked_cert.issuer_name if last_issuer_name != issuer_name: continue if revoked_cert['user_certificate'].native != cert_serial: continue if not revoked_cert.crl_reason_value: crl_reason = crl.CRLReason('unspecified') else: crl_reason = revoked_cert.crl_reason_value return (revoked_cert['revocation_date'], crl_reason) return (None, None) class PolicyTreeRoot(): """ A generic policy tree node, used for the root node in the tree """ # None for the root node, an instance of PolicyTreeNode or PolicyTreeRoot # for all other nodes parent = None # A list of PolicyTreeNode objects children = None def __init__(self, valid_policy, qualifier_set, expected_policy_set): """ Accepts values for a PolicyTreeNode that will be created at depth 0 :param valid_policy: A unicode string of a policy name or OID :param qualifier_set: An instance of asn1crypto.x509.PolicyQualifierInfos :param expected_policy_set: A set of unicode strings containing policy names or OIDs """ self.children = [] self.add_child(valid_policy, qualifier_set, expected_policy_set) def add_child(self, valid_policy, qualifier_set, expected_policy_set): """ Creates a new PolicyTreeNode as a child of this node :param valid_policy: A unicode string of a policy name or OID :param qualifier_set: An instance of asn1crypto.x509.PolicyQualifierInfos :param expected_policy_set: A set of unicode strings containing policy names or OIDs """ child = PolicyTreeNode(valid_policy, qualifier_set, expected_policy_set) child.parent = self self.children.append(child) def remove_child(self, child): """ Removes a child from this node :param child: An instance of PolicyTreeNode """ self.children.remove(child) def at_depth(self, depth): """ Returns a generator yielding all nodes in the tree at a specific depth :param depth: An integer >= 0 of the depth of nodes to yield :return: A generator yielding PolicyTreeNode objects """ for child in list(self.children): if depth == 0: yield child else: for grandchild in child.at_depth(depth - 1): yield grandchild def walk_up(self, depth): """ Returns a generator yielding all nodes in the tree at a specific depth, or above. Yields nodes starting with leaves and traversing up to the root. :param depth: An integer >= 0 of the depth of nodes to walk up from :return: A generator yielding PolicyTreeNode objects """ for child in list(self.children): if depth != 0: for grandchild in child.walk_up(depth - 1): yield grandchild yield child class PolicyTreeNode(PolicyTreeRoot): """ A policy tree node that is used for all nodes but the root """ # A unicode string of a policy name or OID valid_policy = None # An instance of asn1crypto.x509.PolicyQualifierInfos qualifier_set = None # A set of unicode strings containing policy names or OIDs expected_policy_set = None def __init__(self, valid_policy, qualifier_set, expected_policy_set): """ :param valid_policy: A unicode string of a policy name or OID :param qualifier_set: An instance of asn1crypto.x509.PolicyQualifierInfos :param expected_policy_set: A set of unicode strings containing policy names or OIDs """ self.valid_policy = valid_policy self.qualifier_set = qualifier_set self.expected_policy_set = expected_policy_set self.children = [] certvalidator-0.11.1/changelog.md000066400000000000000000000032531274666402600167260ustar00rootroot00000000000000# changelog ## 0.11.1 - Updated [asn1crypto](https://github.com/wbond/asn1crypto) dependency to `0.18.1`, [oscrypto](https://github.com/wbond/oscrypto) dependency to `0.16.1`. ## 0.11.0 - Updated for compatibility with oscrypto 0.16.0 ## 0.10.0 - Backwards compability break: the `require_revocation_checks` parameter was removed and a new keyword parameter, `revocation_mode`, was added to `ValidationContext()`. Validation may now be in a `soft-fail` (default), `hard-fail`, or `require` mode. See the documentation for information about the behavior of each mode. - Added certificate signature hash algorithm checks, with a default blacklist of `md2` and `md5` - Trust roots no longer need to be self-signed, allowing for cross-signed roots - Keys with no `key_usage` extension are now permitted to sign CRLs - An OCSP or CRL check may fail and not result in an error if the other is successful - Exceptions for expired or not-yet-valid certificates now include full date and time - Self-signed certificates now have a unique exception message instead of a generic message indicating the issuer could not be found in the trust roots - `crl_client` can now handle CRLs that are PEM-encoded - Fixed encoding of URLs in Python 2 when fetching CRLs and OCSP responses - Corrected an error when trying to check the signature of a certificate to determine if it is self-signed or not - Fixed a bug with duplicate HTTP headers during OCSP requests on Python 3 - Fixed an exception that would be thrown if a signature not using RSA, DSA or ECDSA is found ## 0.9.1 - Fixed a bug with whitelisting certificates on Python 3.2 ## 0.9.0 - Initial release certvalidator-0.11.1/dev-requirements.txt000066400000000000000000000000411274666402600205050ustar00rootroot00000000000000coverage>=4.0b1 flake8 CommonMarkcertvalidator-0.11.1/dev/000077500000000000000000000000001274666402600152305ustar00rootroot00000000000000certvalidator-0.11.1/dev/__init__.py000066400000000000000000000000001274666402600173270ustar00rootroot00000000000000certvalidator-0.11.1/dev/api_docs.py000066400000000000000000000352031274666402600173660ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import re import os import ast import _ast import textwrap import CommonMark from collections import OrderedDict cur_dir = os.path.dirname(__file__) project_dir = os.path.abspath(os.path.join(cur_dir, '..')) docs_dir = os.path.join(project_dir, 'docs') module_name = 'certvalidator' # Maps a markdown document to a Python source file to look in for # class/method/function docstrings MD_SOURCE_MAP = { 'docs/api.md': [ 'certvalidator/__init__.py', 'certvalidator/context.py', ], } # A search/replace dictionary to modify docstring contents before generating # markdown from them definition_replacements = {} if hasattr(CommonMark, 'DocParser'): raise EnvironmentError("CommonMark must be version 0.6.0 or newer") def _get_func_info(docstring, def_lineno, code_lines, prefix): """ Extracts the function signature and description of a Python function :param docstring: A unicode string of the docstring for the function :param def_lineno: An integer line number that function was defined on :param code_lines: A list of unicode string lines from the source file the function was defined in :param prefix: A prefix to prepend to all output lines :return: A 2-element tuple: - [0] A unicode string of the function signature with a docstring of parameter info - [1] A markdown snippet of the function description """ def_index = def_lineno - 1 definition = code_lines[def_index] definition = definition.rstrip() while not definition.endswith(':'): def_index += 1 definition += '\n' + code_lines[def_index].rstrip() definition = textwrap.dedent(definition).rstrip(':') definition = definition.replace('\n', '\n' + prefix) description = '' found_colon = False params = '' for line in docstring.splitlines(): if line and line[0] == ':': found_colon = True if not found_colon: if description: description += '\n' description += line else: if params: params += '\n' params += line description = description.strip() description_md = '' if description: description_md = '%s%s' % (prefix, description.replace('\n', '\n' + prefix)) description_md = re.sub('\n>(\\s+)\n', '\n>\n', description_md) params = params.strip() if params: definition += (':\n%s """\n%s ' % (prefix, prefix)) definition += params.replace('\n', '\n%s ' % prefix) definition += ('\n%s """' % prefix) definition = re.sub('\n>(\\s+)\n', '\n>\n', definition) for search, replace in definition_replacements.items(): definition = definition.replace(search, replace) return (definition, description_md) def _find_sections(md_ast, sections, last, last_class, total_lines=None): """ Walks through a CommonMark AST to find section headers that delineate content that should be updated by this script :param md_ast: The AST of the markdown document :param sections: A dict to store the start and end lines of a section. The key will be a two-element tuple of the section type ("class", "function", "method" or "attribute") and identifier. The values are a two-element tuple of the start and end line number in the markdown document of the section. :param last: A dict containing information about the last section header seen. Includes the keys "type_name", "identifier", "start_line". :param last_class: A unicode string of the name of the last class found - used when processing methods and attributes. :param total_lines: An integer of the total number of lines in the markdown document - used to work around a bug in the API of the Python port of CommonMark """ def child_walker(node): for child, entering in node.walker(): if child == node: continue yield child, entering for child, entering in child_walker(md_ast): if child.t == 'heading': start_line = child.sourcepos[0][0] if child.level == 2: if last: sections[(last['type_name'], last['identifier'])] = (last['start_line'], start_line - 1) last.clear() if child.level in set([3, 5]): heading_elements = [] for heading_child, _ in child_walker(child): heading_elements.append(heading_child) if len(heading_elements) != 2: continue first = heading_elements[0] second = heading_elements[1] if first.t != 'code': continue if second.t != 'text': continue type_name = second.literal.strip() identifier = first.literal.strip().replace('()', '').lstrip('.') if last: sections[(last['type_name'], last['identifier'])] = (last['start_line'], start_line - 1) last.clear() if type_name == 'function': if child.level != 3: continue if type_name == 'class': if child.level != 3: continue last_class.append(identifier) if type_name in set(['method', 'attribute']): if child.level != 5: continue identifier = last_class[-1] + '.' + identifier last.update({ 'type_name': type_name, 'identifier': identifier, 'start_line': start_line, }) elif child.t == 'block_quote': find_sections(child, sections, last, last_class) if last: sections[(last['type_name'], last['identifier'])] = (last['start_line'], total_lines) find_sections = _find_sections def walk_ast(node, code_lines, sections, md_chunks): """ A callback used to walk the Python AST looking for classes, functions, methods and attributes. Generates chunks of markdown markup to replace the existing content. :param node: An _ast module node object :param code_lines: A list of unicode strings - the source lines of the Python file :param sections: A dict of markdown document sections that need to be updated. The key will be a two-element tuple of the section type ("class", "function", "method" or "attribute") and identifier. The values are a two-element tuple of the start and end line number in the markdown document of the section. :param md_chunks: A dict with keys from the sections param and the values being a unicode string containing a chunk of markdown markup. """ if isinstance(node, _ast.FunctionDef): key = ('function', node.name) if key not in sections: return docstring = ast.get_docstring(node) def_lineno = node.lineno + len(node.decorator_list) definition, description_md = _get_func_info(docstring, def_lineno, code_lines, '> ') md_chunk = textwrap.dedent(""" ### `%s()` function > ```python > %s > ``` > %s """).strip() % ( node.name, definition, description_md ) + "\n" md_chunks[key] = md_chunk elif isinstance(node, _ast.ClassDef): if ('class', node.name) not in sections: return for subnode in node.body: if isinstance(subnode, _ast.FunctionDef): node_id = node.name + '.' + subnode.name method_key = ('method', node_id) is_method = method_key in sections attribute_key = ('attribute', node_id) is_attribute = attribute_key in sections is_constructor = subnode.name == '__init__' if not is_constructor and not is_attribute and not is_method: continue docstring = ast.get_docstring(subnode) def_lineno = subnode.lineno + len(subnode.decorator_list) if not docstring: continue if is_method or is_constructor: definition, description_md = _get_func_info(docstring, def_lineno, code_lines, '> > ') if is_constructor: key = ('class', node.name) class_docstring = ast.get_docstring(node) or '' class_description = textwrap.dedent(class_docstring).strip() if class_description: class_description_md = "> %s\n>" % (class_description.replace("\n", "\n> ")) else: class_description_md = '' md_chunk = textwrap.dedent(""" ### `%s()` class %s > ##### constructor > > > ```python > > %s > > ``` > > %s """).strip() % ( node.name, class_description_md, definition, description_md ) md_chunk = md_chunk.replace('\n\n\n', '\n\n') else: key = method_key md_chunk = textwrap.dedent(""" > > ##### `.%s()` method > > > ```python > > %s > > ``` > > %s """).strip() % ( subnode.name, definition, description_md ) if md_chunk[-5:] == '\n> >\n': md_chunk = md_chunk[0:-5] else: key = attribute_key description = textwrap.dedent(docstring).strip() description_md = "> > %s" % (description.replace("\n", "\n> > ")) md_chunk = textwrap.dedent(""" > > ##### `.%s` attribute > %s """).strip() % ( subnode.name, description_md ) md_chunks[key] = re.sub('[ \\t]+\n', '\n', md_chunk.rstrip()) elif isinstance(node, _ast.If): for subast in node.body: walk_ast(subast, code_lines, sections, md_chunks) for subast in node.orelse: walk_ast(subast, code_lines, sections, md_chunks) def run(): """ Looks through the docs/ dir and parses each markdown document, looking for sections to update from Python docstrings. Looks for section headers in the format: - ### `ClassName()` class - ##### `.method_name()` method - ##### `.attribute_name` attribute - ### `function_name()` function The markdown content following these section headers up until the next section header will be replaced by new markdown generated from the Python docstrings of the associated source files. By default maps docs/{name}.md to {modulename}/{name}.py. Allows for custom mapping via the MD_SOURCE_MAP variable. """ print('Updating API docs...') md_files = [] for root, _, filenames in os.walk(docs_dir): for filename in filenames: if not filename.endswith('.md'): continue md_files.append(os.path.join(root, filename)) parser = CommonMark.Parser() for md_file in md_files: md_file_relative = md_file[len(project_dir) + 1:] if md_file_relative in MD_SOURCE_MAP: py_files = MD_SOURCE_MAP[md_file_relative] py_paths = [os.path.join(project_dir, py_file) for py_file in py_files] else: py_files = [os.path.basename(md_file).replace('.md', '.py')] py_paths = [os.path.join(project_dir, module_name, py_files[0])] if not os.path.exists(py_paths[0]): continue with open(md_file, 'rb') as f: markdown = f.read().decode('utf-8') original_markdown = markdown md_lines = list(markdown.splitlines()) md_ast = parser.parse(markdown) last_class = [] last = {} sections = OrderedDict() find_sections(md_ast, sections, last, last_class, markdown.count("\n") + 1) md_chunks = {} for index, py_file in enumerate(py_files): py_path = py_paths[index] with open(os.path.join(py_path), 'rb') as f: code = f.read().decode('utf-8') module_ast = ast.parse(code, filename=py_file) code_lines = list(code.splitlines()) for node in ast.iter_child_nodes(module_ast): walk_ast(node, code_lines, sections, md_chunks) added_lines = 0 def _replace_md(key, sections, md_chunk, md_lines, added_lines): start, end = sections[key] start -= 1 start += added_lines end += added_lines new_lines = md_chunk.split('\n') added_lines += len(new_lines) - (end - start) # Ensure a newline above each class header if start > 0 and md_lines[start][0:4] == '### ' and md_lines[start - 1][0:1] == '>': added_lines += 1 new_lines.insert(0, '') md_lines[start:end] = new_lines return added_lines for key in sections: if key not in md_chunks: raise ValueError('No documentation found for %s' % key[1]) added_lines = _replace_md(key, sections, md_chunks[key], md_lines, added_lines) markdown = '\n'.join(md_lines).strip() + '\n' if original_markdown != markdown: with open(md_file, 'wb') as f: f.write(markdown.encode('utf-8')) if __name__ == '__main__': run() certvalidator-0.11.1/dev/ci.py000066400000000000000000000012111274666402600161700ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import sys from .tests import run as run_tests if sys.version_info >= (2, 7): from .lint import run as run_lint def run(): """ Runs the linter and tests :return: A bool - if the linter and tests ran successfully """ print('Python ' + sys.version.replace('\n', '')) if sys.version_info >= (2, 7): print('') lint_result = run_lint() else: lint_result = True print('\nRunning tests') sys.stdout.flush() tests_result = run_tests() return lint_result and tests_result certvalidator-0.11.1/dev/coverage.py000066400000000000000000000007511274666402600174000ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import coverage def run(): """ Runs the tests while measuring coverage :return: A bool - if the tests ran successfully """ cov = coverage.Coverage(include='certvalidator/*.py') cov.start() from .tests import run as run_tests result = run_tests() print() cov.stop() cov.save() cov.report(show_missing=False) return result certvalidator-0.11.1/dev/lint.py000066400000000000000000000016411274666402600165520ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import os import flake8 if flake8.__version_info__ < (3,): from flake8.engine import get_style_guide else: from flake8.api.legacy import get_style_guide cur_dir = os.path.dirname(__file__) config_file = os.path.join(cur_dir, '..', 'tox.ini') def run(): """ Runs flake8 lint :return: A bool - if flake8 did not find any errors """ print('Running flake8') flake8_style = get_style_guide(config_file=config_file) paths = [] for root, _, filenames in os.walk('certvalidator'): for filename in filenames: if not filename.endswith('.py'): continue paths.append(os.path.join(root, filename)) report = flake8_style.check_files(paths) success = report.total_errors == 0 if success: print('OK') return success certvalidator-0.11.1/dev/release.py000066400000000000000000000033451274666402600172270ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import os import subprocess import sys import setuptools.sandbox import twine.cli base_dir = os.path.abspath(os.path.join(os.path.dirname(__file__), '..')) setup_file = os.path.join(base_dir, 'setup.py') def run(): """ Creates a sdist .tar.gz and a bdist_wheel --univeral .whl and uploads them to pypi :return: A bool - if the packaging and upload process was successful """ git_wc_proc = subprocess.Popen( ['git', 'status', '--porcelain', '-uno'], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, cwd=base_dir ) git_wc_status, _ = git_wc_proc.communicate() if len(git_wc_status) > 0: print(git_wc_status.decode('utf-8').rstrip(), file=sys.stderr) print('Unable to perform release since working copy is not clean', file=sys.stderr) return False git_tag_proc = subprocess.Popen( ['git', 'tag', '-l', '--contains', 'HEAD'], stdout=subprocess.PIPE, stderr=subprocess.PIPE, cwd=base_dir ) tag, tag_error = git_tag_proc.communicate() if len(tag_error) > 0: print(tag_error.decode('utf-8').rstrip(), file=sys.stderr) print('Error looking for current git tag', file=sys.stderr) return False if len(tag) == 0: print('No git tag found on HEAD', file=sys.stderr) return False tag = tag.decode('ascii').strip() setuptools.sandbox.run_setup( setup_file, ['sdist', 'bdist_wheel', '--universal'] ) twine.cli.dispatch(['upload', 'dist/certvalidator-%s*' % tag]) setuptools.sandbox.run_setup( setup_file, ['clean'] ) certvalidator-0.11.1/dev/stress_test.py000066400000000000000000000135301274666402600201660ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import os import socket import sys import textwrap import time from oscrypto import tls from oscrypto.errors import TLSVerificationError from certvalidator import CertificateValidator, ValidationContext from certvalidator.errors import PathValidationError, PathBuildingError if sys.version_info < (3,): str_cls = unicode else: str_cls = str try: if sys.stdout.isatty(): from colorama import init, Fore, Style init() else: raise EnvironmentError() except (ImportError, EnvironmentError): class Fore: RED = '' YELLOW = '' GREEN = '' RESET = '' class Style: DIM = '' RESET_ALL = '' cur_dir = os.path.dirname(__file__) fixtures_dir = os.path.join(cur_dir, '..', 'tests', 'fixtures') def run(): """ Runs through TLS hosts in the Alexa top 1000 to test TLS functionality :return: A bool - if the test succeeded without any socket errors """ task_start = time.time() success = 0 tls_errors = 0 socket_errors = 0 mismatch_info = [] context = ValidationContext(allow_fetching=True) with open(os.path.join(fixtures_dir, 'alexa_top_1000.csv'), 'rb') as f: for line in f: domain = line.decode('utf-8').rstrip() os_result = None cv_result = None os_message = None cv_message = None try: os_start = time.time() con = tls.TLSSocket(domain, 443, timeout=3) con.close() success += 1 os_result = 'OK' os_message = 'Success' _color('green', 'OK', domain, os_start) except (TLSVerificationError) as e: tls_errors += 1 os_result = 'TLS' os_message = str_cls(e) _color('yellow', 'TLS', domain, os_start, str_cls(e)) except (socket.error) as e: socket_errors += 1 os_result = 'SOCK' os_message = str_cls(e) _color('red', 'SOCK', domain, os_start, str_cls(e)) try: cv_start = time.time() session = tls.TLSSession(manual_validation=True) con = tls.TLSSocket(domain, 443, timeout=3, session=session) validator = CertificateValidator(con.certificate, con.intermediates, context) validator.validate_tls(domain) con.close() success += 1 cv_result = 'OK' cv_message = 'Success' _color('green', 'OK', domain, cv_start) except (PathValidationError, PathBuildingError) as e: tls_errors += 1 cv_result = 'TLS' cv_message = str_cls(e) _color('yellow', 'TLS', domain, cv_start, str_cls(e)) except (socket.error) as e: socket_errors += 1 cv_result = 'SOCK' cv_message = str_cls(e) _color('red', 'SOCK', domain, cv_start, str_cls(e)) if os_result != cv_result: mismatch_info.append([ domain, os_result, os_message, cv_result, cv_message ]) total_time = time.time() - task_start total_domains = success + tls_errors + socket_errors stats = [] if success > 0: stats.append('%d [%sOK%s]' % (success, Fore.GREEN, Fore.RESET)) if tls_errors > 0: stats.append('%d [%sTLS%s]' % (tls_errors, Fore.YELLOW, Fore.RESET)) if socket_errors > 0: stats.append('%d [%sSOCK%s]' % (socket_errors, Fore.RED, Fore.RESET)) print('') print('Checked %d domains in %.3f seconds - %s' % (total_domains, total_time, ' '.join(stats))) if mismatch_info: print('') for info in mismatch_info: os_result = '[%s] %s' % (info[1], info[2]) cv_result = '[%s] %s' % (info[3], info[4]) _color( 'red', 'DIFF', 'oscrypto and certvalidator results for %s are different' % info[0], None, os_result, cv_result ) return socket_errors == 0 def _color(name, status, text, start=None, *extras): """ Prints a status message with color :param name: A unicode string of "green", "yellow" or "red" to color the status with :param status: A unicode string of the status to print :param text: A unicode string of the text to print after the status :param start: A float from time.time() of when the status started - used to print duration :param extras: A list of unicode strings of extra information about the status """ color_const = { 'green': Fore.GREEN, 'red': Fore.RED, 'yellow': Fore.YELLOW, }[name] if start is not None: length = round((time.time() - start) * 1000.0) duration = '%sms' % length else: duration = '' sys.stdout.write( '[%s%s%s] %s %s%s%s\n' % ( color_const, status, Fore.RESET, text, Style.DIM, duration, Style.RESET_ALL ) ) for extra in extras: indent_len = len(status) + 3 wrapped_message = '\n'.join(textwrap.wrap( extra, 120, initial_indent=' ' * indent_len, subsequent_indent=' ' * indent_len )) message = '%s%s%s' % (Style.DIM, wrapped_message, Style.RESET_ALL) try: print(message) except (UnicodeEncodeError) as e: print(message.encode('utf-8')) certvalidator-0.11.1/dev/tests.py000066400000000000000000000032371274666402600167510ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import unittest import re from tests.test_certificate_validator import CertificateValidatorTests from tests.test_crl_client import CRLClientTests from tests.test_ocsp_client import OCSPClientTests from tests.test_registry import RegistryTests from tests.test_validate import ValidateTests test_classes = [CertificateValidatorTests, CRLClientTests, OCSPClientTests, RegistryTests, ValidateTests] def make_suite(): """ Constructs a unittest.TestSuite() of all tests for the package. For use with setuptools. :return: A unittest.TestSuite() object """ loader = unittest.TestLoader() suite = unittest.TestSuite() for test_class in test_classes: tests = loader.loadTestsFromTestCase(test_class) suite.addTests(tests) return suite def run(matcher=None): """ Runs the tests :param matcher: A unicode string containing a regular expression to use to filter test names by. A value of None will cause no filtering. :return: A bool - if the tests succeeded """ suite = unittest.TestSuite() loader = unittest.TestLoader() for test_class in test_classes: if matcher: names = loader.getTestCaseNames(test_class) for name in names: if re.search(matcher, name): suite.addTest(test_class(name)) else: suite.addTest(loader.loadTestsFromTestCase(test_class)) verbosity = 2 if matcher else 1 result = unittest.TextTestRunner(verbosity=verbosity).run(suite) return result.wasSuccessful() certvalidator-0.11.1/docs/000077500000000000000000000000001274666402600154025ustar00rootroot00000000000000certvalidator-0.11.1/docs/api.md000066400000000000000000000202061274666402600164750ustar00rootroot00000000000000# *certvalidator* API Documentation ### `CertificateValidator()` class > ##### constructor > > > ```python > > def __init__(self, end_entity_cert, intermediate_certs=None, validation_context=None): > > """ > > :param end_entity_cert: > > An asn1crypto.x509.Certificate object or a byte string of the DER or > > PEM-encoded X.509 end-entity certificate to validate > > > > :param intermediate_certs: > > None or a list of asn1crypto.x509.Certificate objects or a byte > > string of a DER or PEM-encoded X.509 certificate. Used in > > constructing certificate paths for validation. > > > > :param validation_context: > > A certvalidator.context.ValidationContext() object that controls > > validation options > > """ > > ``` > > ##### `.validate_tls()` method > > > ```python > > def validate_tls(self, hostname): > > """ > > :param hostname: > > A unicode string of the TLS server hostname > > > > :raises: > > certvalidator.errors.PathValidationError - when an error occurs validating the path > > certvalidator.errors.RevokedError - when the certificate or another certificate in its path has been revoked > > certvalidator.errors.InvalidCertificateError - when the certificate is not valid for TLS or the hostname > > > > :return: > > A certvalidator.path.ValidationPath object of the validated > > certificate validation path > > """ > > ``` > > > > Validates the certificate path, that the certificate is valid for > > the hostname provided and that the certificate is valid for the purpose > > of a TLS connection. > > ##### `.validate_usage()` method > > > ```python > > def validate_usage(self, key_usage, extended_key_usage=None, extended_optional=False): > > """ > > :param key_usage: > > A set of unicode strings of the required key usage purposes. Valid > > values include: > > > > - "digital_signature" > > - "non_repudiation" > > - "key_encipherment" > > - "data_encipherment" > > - "key_agreement" > > - "key_cert_sign" > > - "crl_sign" > > - "encipher_only" > > - "decipher_only" > > > > :param extended_key_usage: > > A set of unicode strings of the required extended key usage > > purposes. These must be either dotted number OIDs, or one of the > > following extended key usage purposes: > > > > - "server_auth" > > - "client_auth" > > - "code_signing" > > - "email_protection" > > - "ipsec_end_system" > > - "ipsec_tunnel" > > - "ipsec_user" > > - "time_stamping" > > - "ocsp_signing" > > - "wireless_access_points" > > > > An example of a dotted number OID: > > > > - "1.3.6.1.5.5.7.3.1" > > > > :param extended_optional: > > A bool - if the extended_key_usage extension may be ommited and still > > considered valid > > > > :raises: > > certvalidator.errors.PathValidationError - when an error occurs validating the path > > certvalidator.errors.RevokedError - when the certificate or another certificate in its path has been revoked > > certvalidator.errors.InvalidCertificateError - when the certificate is not valid for the usages specified > > > > :return: > > A certvalidator.path.ValidationPath object of the validated > > certificate validation path > > """ > > ``` > > > > Validates the certificate path and that the certificate is valid for > > the key usage and extended key usage purposes specified. ### `ValidationContext()` class > ##### constructor > > > ```python > > def __init__(self, trust_roots=None, extra_trust_roots=None, other_certs=None, > > whitelisted_certs=None, moment=None, allow_fetching=False, crls=None, > > crl_fetch_params=None, ocsps=None, ocsp_fetch_params=None, > > revocation_mode="soft-fail", weak_hash_algos=None): > > """ > > :param trust_roots: > > If the operating system's trust list should not be used, instead > > pass a list of byte strings containing DER or PEM-encoded X.509 > > certificates, or asn1crypto.x509.Certificate objects. These > > certificates will be used as the trust roots for the path being > > built. > > > > :param extra_trust_roots: > > If the operating system's trust list should be used, but augmented > > with one or more extra certificates. This should be a list of byte > > strings containing DER or PEM-encoded X.509 certificates, or > > asn1crypto.x509.Certificate objects. > > > > :param other_certs: > > A list of byte strings containing DER or PEM-encoded X.509 > > certificates, or a list of asn1crypto.x509.Certificate objects. > > These other certs are usually provided by the service/item being > > validated. In TLS, these would be intermediate chain certs. > > > > :param whitelisted_certs: > > None or a list of byte strings or unicode strings of the SHA-1 > > fingerprint of one or more certificates. The fingerprint is a hex > > encoding of the SHA-1 byte string, optionally separated into pairs > > by spaces or colons. These whilelisted certificates will not be > > checked for validity dates. If one of the certificates is an > > end-entity certificate in a certificate path, any TLS hostname > > mismatches, key usage errors or extended key usage errors will also > > be ignored. > > > > :param moment: > > If certificate validation should be performed based on a date and > > time other than right now. A datetime.datetime object with a tzinfo > > value. If this parameter is specified, then the only way to check > > OCSP and CRL responses is to pass them via the crls and ocsps > > parameters. Can not be combined with allow_fetching=True. > > > > :param crls: > > None or a list/tuple of asn1crypto.crl.CertificateList objects of > > pre-fetched/cached CRLs to be utilized during validation of paths > > > > :param crl_fetch_params: > > None or a dict of keyword args to pass to > > certvalidator.crl_client.fetch() when fetching CRLs or associated > > certificates. Only applicable when allow_fetching=True. > > > > :param ocsps: > > None or a list/tuple of asn1crypto.ocsp.OCSPResponse objects of > > pre-fetched/cached OCSP responses to be utilized during validation > > of paths > > > > :param ocsp_fetch_params: > > None or a dict of keyword args to pass to > > certvalidator.ocsp_client.fetch() when fetching OSCP responses. > > Only applicable when allow_fetching=True. > > > > :param allow_fetching: > > A bool - if HTTP requests should be made to fetch CRLs and OCSP > > responses. If this is True and certificates contain the location of > > a CRL or OCSP responder, an HTTP request will be made to obtain > > information for revocation checking. > > > > :param revocation_mode: > > A unicode string of the revocation mode to use: "soft-fail" (the > > default), "hard-fail" or "require". In "soft-fail" mode, any sort of > > error in fetching or locating revocation information is ignored. In > > "hard-fail" mode, if a certificate has a known CRL or OCSP and it > > can not be checked, it is considered a revocation failure. In > > "require" mode, every certificate in the certificate path must have > > a CRL or OCSP. > > > > :param weak_hash_algos: > > A set of unicode strings of hash algorithms that should be > > considered weak. Valid options include: "md2", "md5", "sha1" > > """ > > ``` > > ##### `.crls` attribute > > > A list of all cached asn1crypto.crl.CertificateList objects > > ##### `.ocsps` attribute > > > A list of all cached asn1crypto.ocsp.OCSPResponse objects > > ##### `.new_revocation_certs` attribute > > > A list of newly-fetched asn1crypto.x509.Certificate objects that were > > obtained from OCSP responses and CRLs certvalidator-0.11.1/docs/readme.md000066400000000000000000000035701274666402600171660ustar00rootroot00000000000000# certvalidator Documentation *certvalidator* is a Python library for validating X.509 certificates and paths. The documentation consists of the following topics: - [Implementation Details](#implementation-details) - [Usage](usage.md) - [API Documentation](api.md) ## Implementation Details *certvalidator* implements the following algorithms: - [X.509/CRL] [Certificate Path Validation algorithm from RFC 5280 Section 5](https://tools.ietf.org/html/rfc5280#section-6) - Minus name constraints - [OCSP] [Signed Response Acceptance Requirements from RFC 6960](https://tools.ietf.org/html/rfc6960#section-3.2) - [TLS] [DNS-ID and CN-ID Matching from RFC 6125](https://tools.ietf.org/html/rfc6125#section-6) Supported features include: - X.509 path building - X.509 basic path validation - Signatures - RSA, DSA and EC algorithms - Name chaining - Validity dates - Basic constraints extension - CA flag - Path length constraint - Key usage extension - Extended key usage extension - Certificate policies - Policy constraints - Policy mapping - Inhibit anyPolicy - Failure on unknown/unsupported critical extensions - TLS/SSL server validation - Whitelisting certificates - Blacklisting hash algorithms - Revocation checks - CRLs - Indirect CRLs - Delta CRLs - OCSP checks - Delegated OCSP responders - Disable, require or allow soft failures - Caching of CRLs/OCSP responses - CRL and OCSP HTTP clients - Point-in-time validation Currently unsupported features: - Name constraints Testing is performed using: - [Public Key Interoperability Test Suite from NIST](http://csrc.nist.gov/groups/ST/crypto_apps_infra/pki/pkitesting.html) - [OCSP tests from OpenSSL](https://github.com/openssl/openssl/blob/master/test/recipes/80-test_ocsp.t) - Various certificates generated for TLS certificate validation certvalidator-0.11.1/docs/usage.md000066400000000000000000000351011274666402600170300ustar00rootroot00000000000000# *certvalidator* Usage - [Basic Path Validation](#basic-path-validation) - [TLS/SSL Server Validation](#tlsssl-server-validation) - [Advanced Features](#advanced-features) - [Whitelisting Certificates](#whitelisting-certificates) - [Blacklisting Hash Algorithms](#blacklisting-hash-algorithms) - [Revocation Checking](#revocation-checking) - [Custom Trust Roots/CA Certs](#custom-trust-roots-ca-certs) - [Moment-In-Time Validation](#moment-in-time-validation) ## Basic Path Validation Basic path validation is peformed using the `CertificateValidator()` class. The only required parameter for the class is the `end_entity_cert`, which must be a byte string of a DER or PEM-encoded X.509 certificate, or an instance of `asn1crypto.x509.Certificate`. ```python from certvalidator import CertificateValidator with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() validator = CertificateValidator(end_entity_cert) ``` Any intermediate certificates required for validation can be provided as a `list` via the second parameter `intermediate_certs`. Each element in the list should also be a byte string of a DER or PEM-encoded X.509 certificate, or an instance of `asn1crypto.x509.Certificate`. ```python from asn1crypto import pem from certvalidator import CertificateValidator end_entity_cert = None intermediates = [] with open('/path/to/cert_chain.pem', 'rb') as f: for type_name, headers, der_bytes in pem.unarmor(f.read(), multiple=True): if end_entity_cert is None: end_entity_cert = der_bytes else: intermediates.append(der_bytes) validator = CertificateValidator(end_entity_cert, intermediates) ``` Once the `CertificateValidator()` object has been constructed, the method `.validate_usage()` is called to build a valid path and verify key usage for the end-entity certificate. The first parameter is a `set` of required key usage purposes required for the certificate to be valid. If an error occurs trying to build a path or check the key usage, a `certvalidator.errors.PathValidationError` exception will be raised. ```python from certvalidator import CertificateValidator, errors with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() try: validator = CertificateValidator(end_entity_cert) validator.validate_usage(set(['digital_signature'])) except (errors.PathValidationError): # The certificate could not be validated ``` The list of valid key usages can be found in the [`CertificateValidator.validate_usage()`](api.md#validate_usage-method) documentation. To check extended key usage, the second parameter, `extended_key_usage` may be passed containing a `set` of extended key usage purposes. Any pre-defined name from the [`CertificateValidator.validate_usage()`](api.md#validate_usage-method) documentation may be passed, or any dotted number OID string. If extended key usage should only be checked if the extension is present, pass `True` to the third parameter, `extended_optional`. ```python from certvalidator import CertificateValidator, errors with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() try: validator = CertificateValidator(end_entity_cert) validator.validate_usage( set(['digital_signature']), set(['server_auth']), True ) except (errors.PathValidationError): # The certificate could not be validated ``` ## TLS/SSL Server Validation To validate a certificate chain from a TLS server, the `.validate_tls()` method may be used. The method takes a single parameter, `hostname`, which must be a unicode string of the server hostname. *Appropriate key usage and extended key usage parameters are automatically checked.* ```python from oscrypto import tls from certvalidator import CertificateValidator, errors session = tls.TLSSession(manual_validation=True) connection = tls.TLSSocket('www.google.com', 443, session=session) try: validator = CertificateValidator(connection.certificate, connection.intermediates) validator.validate_tls(connection.hostname) except (errors.PathValidationError): # The certificate did not match the hostname, or could not be otherwise validated ``` ## Advanced Features Beyond basic path validation and TLS server validation, `CertificateValidator()` allows control of different aspects of the validation via the `ValidationContext()` object. This object is passed via the `validation_context` keyword parameter to the `CertificateValidator()`. - [Whitelisting Certificates](#whitelisting-certificates) - [Blacklisting Hash Algorithms](#blacklisting-hash-algorithms) - [Revocation Checking](#revocation-checking) - [Custom Trust Roots/CA Certs](#custom-trust-roots-ca-certs) - [Moment-In-Time Validation](#moment-in-time-validation) ### Whitelisting Certificates In the event that a service provider has provisioned a certificate containing a hostname mismatch, or a certificate that has expired, it may be necessary to ignore such errors using a whitelist. Whitelisting a certificate will skip all expiration date checks, whether the certificate is an intermediate or an end-entity certificate. Additionally, for end-entity certificates, TLS hostname, key usage and extended key usage checks will be skipped. All other aspects of path validation will be performed. Certificates are identifier by the SHA-1 fingerprint of the certificate. The fingerprint must be a unicode string of the hex encoded bytes. The letters may be upper or lower case, and may be separated by a space, colon or nothing. Example formats: - `"A2 DC AB 7C 7B CF E4 67 0A 61 2D 89 E2 9F DF 61 D0 B1 8F 77"` - `"A2:DC:AB:7C:7B:CF:E4:67:0A:61:2D:89:E2:9F:DF:61:D0:B1:8F:77"` - `"a2:dc:ab:7c:7b:cf:e4:67:0a:61:2d:89:e2:9f:df:61:d0:b1:8f:77"` - `"A2DCAB7C7BCFE4670A612D89E29FDF61D0B18F77"` Fingerprints may be obtained from most web browser certificate dialog boxes, the `asn1crypto.x509.Certificate().sha1_fingerprint` attribute, or from the OpenSSL command line: ```bash openssl s_client -connect example.com:443 /dev/null | openssl x509 -fingerprint ``` Typically when user interaction is involved, displaying the `.sha1_fingerprint` attribute of the `asn1crypto.x509.Certificate()` causing the error will be the most useful method. ```python from certvalidator import CertificateValidator, ValidationContext with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() whitelist = [ end_entity_cert.sha1_fingerprint, ] context = ValidationContext(whitelisted_certs=whitelist) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` ### Blacklisting Hash Algorithms By default, `CertificateValidator()` will raise a validation error if any certificate in the validation path, other than the trust root, uses MD2 or MD5 for the signature hash algorithm. It is possible to add other algorithms to the blacklist by passing the complete list of weak hash algorithms to the `weak_hash_algos` keyword parameter of `ValidationContext()`. ```python from __future__ import unicode_literals rom certvalidator import CertificateValidator, ValidationContext with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() context = ValidationContext(weak_hash_algos=['md2', 'md5', 'sha1']) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` Valid algorithm names are the unicode strings: `"md2"`, `"md5"`, `"sha1"`, `"sha256"`, `"sha384"` and `"sha512"`. ### Revocation Checking By default, `CertificateValidator()` does not perform revocation checking via CRL or OCSP. This is consistent with many modern browsers, such as Google Chrome and Safari on OS X. When revocation checks are desired, they are configured via the `ValidationContext()`. It is possible to provide CRLs and OCSP responses that have been fetched out-of-band, or allow the *certvalidator* package to fetch them itself. #### Allow Fetching To allow the fetching of CRLs or OCSP responses, the `allow_fetching` parameter of `ValidationContext()` must be `True`. ```python from certvalidator import CertificateValidator, ValidationContext with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() context = ValidationContext(allow_fetching=True) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` With this configuration, any CRLs or OCSP responders listed in the end-entity certificate or any intermediate certificates will be fetching via HTTP. *Please note that the default revocation mode is `soft-fail`. If there is no revocation information, the information can not be fetched, or does not match the certificate in question, it will not be used.* If there is the desire to customize the timeout or user agent for the fetchers, please use the `crl_fetch_params` and `ocsp_fetch_params` keyword parameters. #### Out-of-Band Sources If CRLs or OCSP responses are fetched via another mechanism, they can be provided via the `crls` and `ocsps` keyword parameters of the constructor. The `crls` parameter should be a list of byte strings containing the DER-encoded CRLs, or `asn1crypto.crl.CertificateList` objects. The `ocsps` parameter should be a list of byte strings containing the DER-encoded OCSP responses, or `asn1crypto.ocsp.OCSPResponse` objects. ```python from certvalidator import CertificateValidator, ValidationContext with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() crls = [] with open('/path/to/root_crl.der', 'rb') as f: crls.append(f.read()) ocsps = [] with open('/path/to/end_entity_ocsp_response.der', 'rb') as f: ocsps.append(f.read()) context = ValidationContext(crls=crls, ocsps=ocsps) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` *Please note that providing revocation information does allow soft failures unless the . If there is no revocation information or does not match the certificate in question, it will not be used.* #### Setting the Revocation Mode In the case that `soft-fail` is not the desired mode of operation, it is possible to change the revocation mode into one of two other modes: - `hard-fail` - `require` In `hard-fail` mode, any error in checking revocation is considered a failure. However, if there is no known source of revocation information, it is not considered a failure. In `require` mode, any error in checking revocation is considered a failure. In addition, all certificates must have revocation information, otherwise it is considered a path validation failure. The `revocation_mode` keyword parameter of `ValidationContext()` accepts a unicode string of: `"soft-fail"`, `"hard-fail"` or `"require"`. ```python from __future__ import unicode_literals from certvalidator import CertificateValidator, ValidationContext with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() context = ValidationContext(allow_fetching=True, revocation_mode="hard-fail") validator = CertificateValidator(end_entity_cert, validation_context=context) ``` #### Certificates for Revocation Information If extra certificates are required to validate CRLs or OCSP responses, they may be provided via the `other_certs` keyword parameter of the `ValidationContext()` object. When `allow_fetching` is `True`, the fetchers will download any necessary certificates referenced in the CRLs or OCSP responses. Thus, the `other_certs` parameter is primarily useful when passing out-of-band revocation information via the `crls` and `ocsps` parameters. The certificates should be byte strings of DER or PEM-encoded X.509 certificates, or `asn1crypto.x509.Certificate` objects. ```python from certvalidator import CertificateValidator, ValidationContext with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() crls = [] with open('/path/to/root_crl.der', 'rb') as f: crls.append(f.read()) ocsps = [] with open('/path/to/end_entity_ocsp_response.der', 'rb') as f: ocsps.append(f.read()) other_certs = [] with open('/path/to/ocsp_responder_cert.crt', 'rb') as f: other_certs.append(f.read()) context = ValidationContext(crls=crls, ocsps=ocsps, other_certs=other_certs) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` ### Custom Trust Roots/CA Certs By default, *certvalidator* uses the trust roots provided by the operating system to build a validation path. To use a custom list, provide a list of byte strings containing DER or PEM-encoded X.509 certificates or `asn1crypto.x509.Certificate` objects to the `trust_roots` keyword parameter of `ValidationContext()`. ```python from asn1crypto import pem from certvalidator import CertificateValidator, ValidationContext trust_roots = [] with open('/path/to/ca_certs.bundle', 'rb') as f: for _, _, der_bytes in pem.unarmor(f.read(), multiple=True): trust_roots.append(der_bytes) with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() context = ValidationContext(trust_roots=trust_roots) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` To simply add one or more extra trust roots, pass the list to the `extra_trust_roots` keyword parameter. ```python from asn1crypto import pem from certvalidator import CertificateValidator, ValidationContext extra_trust_roots = [] with open('/path/to/extra_ca_certs.bundle', 'rb') as f: for _, _, der_bytes in pem.unarmor(f.read(), multiple=True): extra_trust_roots.append(der_bytes) with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() context = ValidationContext(extra_trust_roots=extra_trust_roots) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` ### Moment-In-Time Validation Unless otherwise configured, `CertificateValidator()` uses the current UTC date and time for certificate validation. To use a time in the past, a `datetime.datetime` object with a `tzinfo` attribute must be passed to the `moment` keyword parameter of `CertificateValidator()`. The [pytz](http://pytz.sourceforge.net) package may be useful in constructing a `datetime` object in a specific timezone. If the `datetime` will be in the UTC timezone, `asn1crypto.util.timezone.utc` can be used. ```python from datetime import datetime from asn1crypto.util import timezone from certvalidator import CertificateValidator, ValidationContext with open('/path/to/cert.crt', 'rb') as f: end_entity_cert = f.read() validation_time = datetime(2012, 1, 1, 0, 0, 0, tzinfo=timezone.utc) context = ValidationContext(moment=validation_time) validator = CertificateValidator(end_entity_cert, validation_context=context) ``` If moment-in-time validation is being performed, the `allow_fetching` option can not be used. Instead, any revocation CRLs or OCSP responses should be provided via the `crls` or `ocsps` parameters. certvalidator-0.11.1/readme.md000066400000000000000000000075321274666402600162400ustar00rootroot00000000000000# certvalidator A Python library for validating X.509 certificates or paths. Supports various options, including: validation at a specific moment in time, whitelisting and revocation checks. - [Features](#features) - [Related Crypto Libraries](#related-crypto-libraries) - [Current Release](#current-release) - [Dependencies](#dependencies) - [Installation](#installation) - [License](#license) - [Documentation](#documentation) - [Continuous Integration](#continuous-integration) - [Testing](#testing) - [Development](#development) ## Features - X.509 path building - X.509 basic path validation - Signatures - RSA, DSA and EC algorithms - Name chaining - Validity dates - Basic constraints extension - CA flag - Path length constraint - Key usage extension - Extended key usage extension - Certificate policies - Policy constraints - Policy mapping - Inhibit anyPolicy - Failure on unknown/unsupported critical extensions - TLS/SSL server validation - Whitelisting certificates - Blacklisting hash algorithms - Revocation checks - CRLs - Indirect CRLs - Delta CRLs - OCSP checks - Delegated OCSP responders - Disable, require or allow soft failures - Caching of CRLs/OCSP responses - CRL and OCSP HTTP clients - Point-in-time validation Unsupported features: - Name constraints ## Related Crypto Libraries *certvalidator* is part of the modularcrypto family of Python packages: - [asn1crypto](https://github.com/wbond/asn1crypto) - [oscrypto](https://github.com/wbond/oscrypto) - [csrbuilder](https://github.com/wbond/csrbuilder) - [certbuilder](https://github.com/wbond/certbuilder) - [crlbuilder](https://github.com/wbond/crlbuilder) - [ocspbuilder](https://github.com/wbond/ocspbuilder) - [certvalidator](https://github.com/wbond/certvalidator) ## Current Release 0.11.1 - [changelog](changelog.md) ## Dependencies - *asn1crypto* - *oscrypto* - Python 2.6, 2.7, 3.2, 3.3, 3.4, 3.5 or pypy ## Installation ```bash pip install certvalidator ``` ## License *certvalidator* is licensed under the terms of the MIT license. See the [LICENSE](LICENSE) file for the exact license text. ## Documentation [*certvalidator* documentation](docs/readme.md) ## Continuous Integration - [Windows](https://ci.appveyor.com/project/wbond/certvalidator/history) via AppVeyor - [OS X & Linux](https://travis-ci.org/wbond/certvalidator/builds) via Travis CI ## Testing Tests are written using `unittest` and require no third-party packages: ```bash python run.py tests ``` To run only some tests, pass a regular expression as a parameter to `tests`. ```bash python run.py tests path ``` ### Test Cases The test cases for the library are comprised of: - [Public Key Interoperability Test Suite from NIST](http://csrc.nist.gov/groups/ST/crypto_apps_infra/pki/pkitesting.html) - [OCSP tests from OpenSSL](https://github.com/openssl/openssl/blob/master/test/recipes/80-test_ocsp.t) - Various certificates generated for TLS certificate validation ## Development To install required development dependencies, execute: ```bash pip install -r dev-requirements.txt ``` The following commands will run the linter and test coverage: ```bash python run.py lint python run.py coverage ``` The following will regenerate the API documentation: ```bash python run.py api_docs ``` The following will run a test that connects to all (non-adult) sites in the Alexa top 1000 that respond on port 443: ```bash python run.py stress_test ``` Once the script is complete, results that differ between the OS validation and the *certvalidator* validation will be listed for further debugging. After creating a [semver](http://semver.org/) git tag, a `.tar.gz` and `.whl` of the package can be created and uploaded to [PyPi](https://pypi.python.org/pypi/certvalidator) by executing: ```bash python run.py release ``` certvalidator-0.11.1/run.py000077500000000000000000000024461274666402600156410ustar00rootroot00000000000000#!/usr/bin/env python # coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import sys if sys.version_info < (3,): byte_cls = str else: byte_cls = bytes def show_usage(): print('Usage: run.py (api_docs | lint | tests [regex] | coverage | ci | stress_test | release)', file=sys.stderr) sys.exit(1) def get_arg(num): if len(sys.argv) < num + 1: return None arg = sys.argv[num] if isinstance(arg, byte_cls): arg = arg.decode('utf-8') return arg if len(sys.argv) < 2 or len(sys.argv) > 3: show_usage() task = get_arg(1) if task not in set(['api_docs', 'lint', 'tests', 'coverage', 'ci', 'stress_test', 'release']): show_usage() if task != 'tests' and len(sys.argv) == 3: show_usage() params = [] if task == 'api_docs': from dev.api_docs import run elif task == 'lint': from dev.lint import run elif task == 'tests': from dev.tests import run matcher = get_arg(2) if matcher: params.append(matcher) elif task == 'coverage': from dev.coverage import run elif task == 'ci': from dev.ci import run elif task == 'stress_test': from dev.stress_test import run elif task == 'release': from dev.release import run result = run(*params) sys.exit(int(not result)) certvalidator-0.11.1/setup.py000066400000000000000000000035041274666402600161660ustar00rootroot00000000000000import os import shutil from setuptools import setup, find_packages, Command import certvalidator class CleanCommand(Command): user_options = [ ('all', None, '(Compatibility with original clean command)') ] def initialize_options(self): self.all = False def finalize_options(self): pass def run(self): folder = os.path.dirname(os.path.abspath(__file__)) for sub_folder in ['build', 'dist', 'certvalidator.egg-info']: full_path = os.path.join(folder, sub_folder) if os.path.exists(full_path): shutil.rmtree(full_path) setup( name='certvalidator', version=certvalidator.__version__, description='Validates X.509 certificates and paths', long_description='Docs for this project are maintained at https://github.com/wbond/certvalidator#readme.', url='https://github.com/wbond/certvalidator', author='wbond', author_email='will@wbond.net', license='MIT', classifiers=[ 'Development Status :: 4 - Beta', 'Intended Audience :: Developers', 'License :: OSI Approved :: MIT License', 'Programming Language :: Python :: 2.6', 'Programming Language :: Python :: 2.7', 'Programming Language :: Python :: 3.2', 'Programming Language :: Python :: 3.3', 'Programming Language :: Python :: 3.4', 'Programming Language :: Python :: 3.5', 'Programming Language :: Python :: Implementation :: PyPy', 'Topic :: Security :: Cryptography', ], keywords='crypto pki x509 certificate crl ocsp', install_requires=[ 'asn1crypto>=0.18.1', 'oscrypto>=0.16.1' ], packages=find_packages(exclude=['tests*', 'dev*']), test_suite='dev.tests.make_suite', cmdclass={ 'clean': CleanCommand, } ) certvalidator-0.11.1/tests/000077500000000000000000000000001274666402600156145ustar00rootroot00000000000000certvalidator-0.11.1/tests/__init__.py000066400000000000000000000000001274666402600177130ustar00rootroot00000000000000certvalidator-0.11.1/tests/_unittest_compat.py000066400000000000000000000057271274666402600215620ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import sys import unittest import re _non_local = {'patched': False} def patch(): if not sys.version_info < (2, 7): return if _non_local['patched']: return unittest.TestCase.assertIsInstance = _assert_is_instance unittest.TestCase.assertRaises = _assert_raises unittest.TestCase.assertRaisesRegexp = _assert_raises_regexp unittest.TestCase.assertLess = _assert_less unittest.TestCase.assertIn = _assert_in _non_local['patched'] = True def _assert_less(self, a, b, msg=None): if not a < b: standard_msg = '%s not less than %s' % (unittest.util.safe_repr(a), unittest.util.safe_repr(b)) self.fail(self._formatMessage(msg, standard_msg)) def _assert_is_instance(self, obj, cls, msg=None): if not isinstance(obj, cls): if not msg: msg = '%s is not an instance of %r' % (obj, cls) self.fail(msg) def _assert_in(self, member, container, msg=None): if member not in container: standard_msg = '%s not found in %s' % (unittest.util.safe_repr(member), unittest.util.safe_repr(container)) self.fail(self._formatMessage(msg, standard_msg)) def _assert_raises(self, excClass, callableObj=None, *args, **kwargs): # noqa context = _AssertRaisesContext(excClass, self) if callableObj is None: return context with context: callableObj(*args, **kwargs) def _assert_raises_regexp(self, expected_exception, expected_regexp, callable_obj=None, *args, **kwargs): if expected_regexp is not None: expected_regexp = re.compile(expected_regexp) context = _AssertRaisesContext(expected_exception, self, expected_regexp) if callable_obj is None: return context with context: callable_obj(*args, **kwargs) class _AssertRaisesContext(object): def __init__(self, expected, test_case, expected_regexp=None): self.expected = expected self.failureException = test_case.failureException self.expected_regexp = expected_regexp def __enter__(self): return self def __exit__(self, exc_type, exc_value, tb): if exc_type is None: try: exc_name = self.expected.__name__ except AttributeError: exc_name = str(self.expected) raise self.failureException( "{0} not raised".format(exc_name)) if not issubclass(exc_type, self.expected): # let unexpected exceptions pass through return False self.exception = exc_value # store for later retrieval if self.expected_regexp is None: return True expected_regexp = self.expected_regexp if not expected_regexp.search(str(exc_value)): raise self.failureException( '"%s" does not match "%s"' % (expected_regexp.pattern, str(exc_value)) ) return True certvalidator-0.11.1/tests/fixtures/000077500000000000000000000000001274666402600174655ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/GeoTrust_EV_SSL_CA_-_G4.crt000066400000000000000000000030751274666402600242040ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIEbjCCA1agAwIBAgIQboqQ68/wRIpyDQgF0IKlRDANBgkqhkiG9w0BAQsFADBY MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjExMC8GA1UEAxMo R2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMzEw MzEwMDAwMDBaFw0yMzEwMzAyMzU5NTlaMEcxCzAJBgNVBAYTAlVTMRYwFAYDVQQK Ew1HZW9UcnVzdCBJbmMuMSAwHgYDVQQDExdHZW9UcnVzdCBFViBTU0wgQ0EgLSBH NDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANm0BfI4Zw8J53z1Yyrl uV6oEa51cdlMhGetiV38KD0qsKXV1OYwCoTU5BjLhTfFRnHrHHtp22VpjDAFPgfh bzzBC2HmOET8vIwvTnVX9ZaZfD6HHw+QS3DDPzlFOzpry7t7QFTRi0uhctIE6eBy GpMRei/xq52cmFiuLOp3Xy8uh6+4a+Pi4j/WPeCWRN8RVWNSL/QmeMQPIE0KwGhw FYY47rd2iKsYj081HtSMydt+PUTUNozBN7VZW4f56fHUxSi9HdzMlnLReqGnILW4 r/hupWB7K40f7vQr1mnNr8qAWCnoTAAgikkKbo6MqNEAEoS2xeKVosA7pGvwgtCW XSUCAwEAAaOCAUMwggE/MBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQD AgEGMC8GCCsGAQUFBwEBBCMwITAfBggrBgEFBQcwAYYTaHR0cDovL2cyLnN5bWNi LmNvbTBHBgNVHSAEQDA+MDwGBFUdIAAwNDAyBggrBgEFBQcCARYmaHR0cHM6Ly93 d3cuZ2VvdHJ1c3QuY29tL3Jlc291cmNlcy9jcHMwNAYDVR0fBC0wKzApoCegJYYj aHR0cDovL2cxLnN5bWNiLmNvbS9HZW9UcnVzdFBDQS5jcmwwKQYDVR0RBCIwIKQe MBwxGjAYBgNVBAMTEVN5bWFudGVjUEtJLTEtNTM4MB0GA1UdDgQWBBTez1xQt64C HxUXqhboDbUonWpa8zAfBgNVHSMEGDAWgBQs1VBBlxWL8I82YVtK+2vZmckzkjAN BgkqhkiG9w0BAQsFAAOCAQEAtI69B7mahew7Z70HYGHmhNHU7+sbuguCS5VktmZT I723hN3ke40J2s+y9fHDv4eEvk6mqMLnEjkoNOCkVkRADJ+IoxXT6NNe4xwEYPtp Nk9qfgwqKMHzqlgObM4dB8NKwJyNw3SxroLwGuH5Tim9Rt63Hfl929kPhMuSRcwc sxj2oM9xbwwum9Its5mTg0SsFaqbLmfsT4hpBVZ7i7JDqTpsHBMzJRv9qMhXAvsc 4NG9O1ZEZcNj9Rvv7DDZ424uE+k5CCoMcvOazPYnKYTT70zHhBFlH8bjgQPbh8x4 97Wdlj5qf7wRhXp15kF9Dc/55YVpJY/HjQct+GkPy0FTAA== -----END CERTIFICATE-----certvalidator-0.11.1/tests/fixtures/alexa_top_1000.csv000066400000000000000000000240761274666402600226270ustar00rootroot00000000000000google.com facebook.com youtube.com baidu.com yahoo.com amazon.com wikipedia.org login.qq.com twitter.com taobao.com google.co.in login.live.com linkedin.com weibo.com bing.com google.co.jp ebay.com yandex.ru vk.com tmall.com www.hao123.com instagram.com google.de msn.com amazon.co.jp t.co google.co.uk pinterest.com onclickads.net mail.ru reddit.com google.fr wordpress.com google.ru www.ask.com blogspot.com google.com.br paypal.com www.aliexpress.com tumblr.com apple.com imgur.com microsoft.com google.it google.es www.imdb.com netflix.com amazon.de disney.com ok.ru google.ca stackoverflow.com google.com.mx amazon.co.uk amazon.in google.com.hk www.rakuten.co.jp www.diply.com craigslist.org blogger.com google.com.tr espn.go.com www.cnn.com www.outbrain.com www.jd.com flipkart.com adnetworkperformance.com google.co.id google.co.kr popads.net bbc.co.uk dropbox.com google.pl github.com ebay.de google.com.au cntv.cn kat.cr www.pixnet.net ebay.co.uk www.directrev.com terraclicks.com nytimes.com dailymotion.com www.alipay.com tradeadexchange.com sogou.com adobe.com bbc.com wikia.com 163.com amazon.cn coccoc.com www.dailymail.co.uk www.indiatimes.com english.china.com booking.com google.com.tw chase.com google.com.eg office.com www.huffingtonpost.com google.com.sa www.buzzfeed.com www.walmart.com detail.tmall.com google.com.ar login.microsoftonline.com www.snapdeal.com amazon.fr aws.amazon.com whatsapp.com adcash.com etsy.com twitch.tv www.theguardian.com slideshare.net google.com.pk bankofamerica.com yelp.com stackexchange.com www.aol.com www.cnet.com target.com indeed.com flickr.com amazon.it reimageplus.com quora.com forbes.com www.weather.com soundcloud.com douban.com vice.com google.nl www.ettoday.net matome.naver.jp adf.ly bestbuy.com google.co.ve google.co.za wellsfargo.com adplxmd.com zillow.com google.gr leboncoin.fr www.ikea.com avito.ru godaddy.com vimeo.com salesforce.com about.com mozilla.org google.com.ua foxnews.com www.nih.gov livejournal.com popcash.net theladbible.com tripadvisor.com files.wordpress.com washingtonpost.com deviantart.com www.wikihow.com www.w3schools.com taboola.com www.zhihu.com 9gag.com gfycat.com feedly.com detik.com nametests.com google.com.co mediafire.com themeforest.net onet.pl www.espncricinfo.com wordpress.org steamcommunity.com americanexpress.com www.comcast.net amazon.es www.pixiv.net mystart.com telegraph.co.uk www.homedepot.com shutterstock.com businessinsider.com wix.com www.steampowered.com secureserver.net google.ro archive.org www.bilibili.com google.se office365.com www.usps.com google.com.sg groupon.com nfl.com google.com.ng wikimedia.org www.ups.com web.de flirchi.com rambler.ru ebay-kleinanzeigen.de www.skype.com www.ndtv.com weebly.com www.orange.fr www.avg.com addthis.com google.com.ph user.gamer.com.tw github.io smzdm.com google.be hulu.com hdfcbank.com gmx.net www.mercadolivre.com.br www.speedtest.net paytm.com media.tumblr.com mailchimp.com ebay.in xfinity.com www.ifeng.com www.usatoday.com uptodown.com www.webmd.com goodreads.com xuite.net hp.com google.pt gmail.com bet365.com amazon.ca www.fedex.com blogfa.com blog.jp liveadexchanger.com www.t-online.de www.babytree.com google.com.pe spiegel.de google.ae pandora.com hootsuite.com seznam.cz stumbleupon.com answers.com www.capitalone.com www.thesaurus.com gameforge.com www.icicibank.com abs-cbnnews.com www.fbcdn.net www.macys.com bloomberg.com www.ign.com kaskus.co.id jabong.com spotify.com 1688.com www.samsung.com www.bild.de 2ch.net wsj.com www.dell.com badoo.com google.ch www.kohls.com liputan6.com www.onlinesbi.com www.engadget.com www.accuweather.com mega.nz www.dmm.com att.com chaoshi.tmall.com rediff.com tistory.com slickdeals.net google.cl reuters.com www.styletv.com.cn adidas.tmall.com google.az icloud.com www.1905.com zendesk.com life.com.tw google.cz haosou.com trello.com www.newegg.com www.reference.com sberbank.ru plarium.com watsons.tmall.com battle.net ebay.it verizonwireless.com www.sahibinden.com eksisozluk.com kickstarter.com evernote.com liveinternet.ru cnnic.cn vid.me google.hu www.gap.com all2lnk.com www.elpais.com bleacherreport.com list.tmall.com shopclues.com google.co.il www.trackingclick.net oracle.com infusionsoft.com ijreview.com googleadservices.com likes.com ask.fm ebay.com.au scribd.com exoclick.com ppomppu.co.kr slack.com onedio.com thefreedictionary.com pinimg.com yandex.ua www.nordstrom.com kinogo.co www.lady8844.com uploaded.net hurriyet.com.tr www.hm.com rt.com www.retailmenot.com www.blogimg.jp taleo.net kinopoisk.ru list-manage.com 4shared.com cbssports.com youradexchange.com goal.com citi.com nba.com google.ie google.dz lifehacker.com www.ce.cn savefrom.net ewt.cc quikr.com fiverr.com meetup.com www.ameba.jp www.eastday.com www.lowes.com allrecipes.com buzzfil.net rdsa2012.com google.fi olx.in 4dsply.com gizmodo.com surveymonkey.com free.fr teepr.com www.independent.co.uk disqus.com 1111.tmall.com time.com www.asos.com mobile.de neobux.com albawabhnews.com www.costco.com xda-developers.com souq.com xe.com www.chip.de java.com gmarket.co.kr zippyshare.com nbcnews.com urdupoint.com gamefaqs.com medium.com subscene.com www.21cn.com www.theverge.com goodgamestudios.com google.co.th www.hupu.com techcrunch.com wunderground.com www.lenovo.com google.sk www.naukri.com intuit.com ancestry.com www.chinaz.com bestadbid.com siteadvisor.com www.autohome.com.cn unblocked.la www.gearbest.com lemonde.fr www.hatena.ne.jp www.expedia.com youboy.com shopify.com playstation.com blackboard.com doubleclick.net www.hotels.com beeg.com suning.com www.mercadolibre.com.ar www.11st.co.kr google.com.vn www.mercadolibre.com.ve nike.com nifty.com sh.st www.people.com google.dk instructables.com realtor.com www.jimdo.com www.kijiji.ca 6pm.com www.mirror.co.uk npr.org subito.it www.douyutv.com olx.pl discovercard.com www.blogspot.jp zulily.com issuu.com sabq.org seesaa.net glassdoor.com box.com airbnb.com kooora.com www.xunlei.com www.taringa.net www.overstock.com ebay.fr www.verizon.com clien.net rottentomatoes.com timeanddate.com lazada.co.id bukalapak.com onclicktop.com megapopads.com www.mi.com lefigaro.fr kayak.com focus.de youdao.com codecanyon.net vcommission.com www.sears.com www.so-net.ne.jp instructure.com cityadspix.com bhaskar.com www.yodobashi.com freepik.com okcupid.com duckduckgo.com wayfair.com squarespace.com www.k618.cn fidelity.com woot.com foodnetwork.com www.gmanetwork.com wetransfer.com www.latimes.com moneycontrol.com www.japanpost.jp tmz.com www.urbandictionary.com zomato.com yandex.com.tr hespress.com udemy.com r10.net cookpad.com google.com.my airtel.in goo.gl www.microsoftstore.com www.slate.com asus.com interia.pl pof.com southwest.com popped.biz billdesk.com mixi.jp change.org researchgate.net www.eonline.com asana.com trulia.com www.bhphotovideo.com wonderlandads.com www.wired.com www.makemytrip.com agoda.com shareasale.com academia.edu cdiscount.com constantcontact.com php.net askmebazaar.com abcnews.go.com fanli.com tokopedia.com cnbc.com food.com statcounter.com ensonhaber.com pch.com clickadu.com www.momoshop.com.tw bomb01.com www.blogspot.mx domaintools.com superuser.com swagbucks.com aweber.com www.staples.com jcpenney.com www.xbox.com buy.tmall.com twoo.com www.pcmag.com www.abril.com.br www.asahi.com gigazine.net cbc.ca chron.com videodownloadconverter.com custhelp.com yandex.kz hostgator.com houzz.com eventbrite.com nypost.com upwork.com zoho.com bitly.com sciencedirect.com www.mercadolibre.com.mx zappos.com patch.com www.cbsnews.com appledaily.com.tw gamespot.com olx.ua giphy.com faithtap.com norton.com www.eastmoney.com howtogeek.com popsugar.com www.yallakora.com theatlantic.com gemius.pl b5m.com www.babycenter.com commentcamarche.net vetogate.com www.netshoes.com.br www.exblog.jp weblio.jp www.zara.com leagueoflegends.com www.jrj.com.cn egou.com messenger.com www.58.com voc.com.cn www.ticketmaster.com semrush.com histats.com clixsense.com wp.com www.315che.com behance.net www.state.gov jumia.com.ng zing.vn www.lequipe.fr www.chinaso.com pureadexchange.com toysrus.com bodybuilding.com mayoclinic.org mit.edu www.intoday.in www.nhk.or.jp gutefrage.net cbs.com usaa.com coursera.org www.adp.com rightmove.co.uk www.ibm.com wikiwiki.jp mynet.com to8to.com saramin.co.kr gismeteo.ru www.ew.com marketwatch.com mackeeper.com backpage.com wiktionary.org europa.eu zone-telechargement.com vk.me www.cloudsrvtrk.com nydailynews.com thesportbible.com google.co.nz myfitnesspal.com milanuncios.com www.nhl.com www.qvc.com www.redirectvoluum.com www.acfun.tv gyazo.com indianexpress.com www.delta.com www.mobile01.com slimspots.com primewire.ag techradar.com informer.com www.sbnation.com www.yoka.com atlassian.net uniqlo.com ebates.com sephora.com www.bookmyshow.com www.india.com www.blogspot.com.tr disq.us google.no google.bg olx.com.br androidcentral.com www.dianping.com www.webex.com ted.com tsite.jp t-mobile.com fanduel.com infoseek.co.jp ehow.com www.gov.uk quizlet.com yadi.sk almasryalyoum.com shareba.com usbank.com www.yenisafak.com www.netteller.com genius.com india-mmm.net lapatilla.com cisco.com gawker.com android.com www.cracked.com tinyurl.com hubspot.com tomshardware.com drom.ru www.as.com clarin.com www.etao.com lifebuzz.com ampclicks.com getpocket.com mega.co.nz prezi.com www.thehindu.com www.welt.de mysmartprice.com dreamstime.com gamepedia.com www.argos.co.uk agar.io cnblogs.com google.by www.allocine.fr www.tribunnews.com united.com tutorialspoint.com 123rf.com adme.ru www.audible.com google.rs sfgate.com www.sky.com www.intel.com www.rakuten.ne.jp nbcsports.com rarbg.to google.lk www.tesco.com ebay.ca priceline.com roblox.com breitbart.com thedailybeast.com vodlocker.com www.banggood.com usmagazine.com www.digitaltrends.com kotaku.com www.masrawy.com www.fandango.com deezer.com www.mapquest.com www.2chblog.jp coupons.com 4pda.ru elfagr.org facenama.com tagged.com prntscr.com carview.co.jp thisav.com dafont.com google.com.kw walgreens.com ultimate-guitar.com ccm.net xing.com www.sammydress.com vine.co whitepages.com digg.com otto.de haberturk.com weather.gov www.bedbathandbeyond.com www.mackolik.com google.hr www.blogspot.ru www.match.com bt.com n11.com news.com.au vente-privee.com alwafd.org nairaland.com www.abs-cbn.com hdzog.com basecamp.com shutterfly.comcertvalidator-0.11.1/tests/fixtures/codex.crt000066400000000000000000000044311274666402600213030ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIGizCCBXOgAwIBAgIQYg46WU6Gb9G2jdI/8qVAIjANBgkqhkiG9w0BAQsFADBH MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEgMB4GA1UEAxMX R2VvVHJ1c3QgRVYgU1NMIENBIC0gRzQwHhcNMTQxMjE3MDAwMDAwWhcNMTUxMDI5 MjM1OTU5WjCB1DETMBEGCysGAQQBgjc8AgEDEwJVUzEeMBwGCysGAQQBgjc8AgEC FA1NYXNzYWNodXNldHRzMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjES MBAGA1UEBRMJNDcxNzE0NjM5MQswCQYDVQQGEwJVUzEWMBQGA1UECBQNTWFzc2Fj aHVzZXR0czEQMA4GA1UEBxQHTmV3YnVyeTEeMBwGA1UEChQVQ29kZXggTm9uIFN1 ZmZpY2l0IExDMRMwEQYDVQQDFApjb2RleG5zLmlvMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAn1IWBm9rvLbYyxu10iBprifB5hVJEWa7mQaXqU54v3up llfcZzqpL2Bk0MHIfPTbxwg1n3B9m4+Ey1HOgWeiVFxOHA8dI6SgXCSAOvxPVLsT cy82iNBVpBvJ+Ci1u3lLUh8UzS0j2eci8U+3rVrwrMjiaboexCIV1bXQteiOihWh YnEpsqHivPXX8DQ6rvG9PMBXCVPkwqJLA0GAzGdwvddyqMa5760Yv2170XpwNg7v wih3AH3pMKX39Cgd+Jn8zhzuB0RgYdkQuEcqI8V3O24DwBW6hLyVL3ajFDr1VQb1 kLT219G6rMND8PzSfaNiYvitPSjsHbDNFmD8hHppBwIDAQABo4IC4zCCAt8wUgYD VR0RBEswSYIOZGV2LmNvZGV4bnMuaW+CDXJjLmNvZGV4bnMuaW+CEXBhY2thZ2Vj b250cm9sLmlvggl3Ym9uZC5uZXSCCmNvZGV4bnMuaW8wCQYDVR0TBAIwADAOBgNV HQ8BAf8EBAMCBaAwKwYDVR0fBCQwIjAgoB6gHIYaaHR0cDovL2dtLnN5bWNiLmNv bS9nbS5jcmwwgaAGA1UdIASBmDCBlTCBkgYJKwYBBAHwIgEGMIGEMD8GCCsGAQUF BwIBFjNodHRwczovL3d3dy5nZW90cnVzdC5jb20vcmVzb3VyY2VzL3JlcG9zaXRv cnkvbGVnYWwwQQYIKwYBBQUHAgIwNQwzaHR0cHM6Ly93d3cuZ2VvdHJ1c3QuY29t L3Jlc291cmNlcy9yZXBvc2l0b3J5L2xlZ2FsMB0GA1UdJQQWMBQGCCsGAQUFBwMB BggrBgEFBQcDAjAfBgNVHSMEGDAWgBTez1xQt64CHxUXqhboDbUonWpa8zBXBggr BgEFBQcBAQRLMEkwHwYIKwYBBQUHMAGGE2h0dHA6Ly9nbS5zeW1jZC5jb20wJgYI KwYBBQUHMAKGGmh0dHA6Ly9nbS5zeW1jYi5jb20vZ20uY3J0MIIBAwYKKwYBBAHW eQIEAgSB9ASB8QDvAHUApLkJkLQYWBSHuxOizGdwCjw1mAT5G9+443fNDsgN3BAA AAFKVctwzgAABAMARjBEAiBhrEBQ6LfRQnQ2EQvOlsFtTu906MGMT+eXpr8RiJQ5 bAIgesSFdYX7Qqs5AmV4/A6UQswos0iUc9NrvkUjnCe5+FMAdgBo9pj4H2SCvjqM 7rkoHUz8cVFdZ5PURNEKZ6y7T0/7xAAAAUpVy3D0AAAEAwBHMEUCIGJv8m9tSDUh b8Cx/+GKLZbgqhoR5KvmwqnUkomve8BUAiEAjDx9OdDiIpoFNTrabIAqFy4l9/z8 AcGY8ZYJNLjl5YIwDQYJKoZIhvcNAQELBQADggEBAFk2w3U4Rxa3pHBjuuq26ZZx S38UV2MSGon2Vr0pNtsRs4A0lcfqwX63CljuEWVCWQcLap00CgnfL4Lk0Nvt3HNB Vh3/rXzxyOUXvPzWhatyMmjl19y/iO6JGnEfPkk9Xzv6iLfCB0aZhm9V0pswbbKg bST1kUrftEBMeAqOQYgK0wvFu2TB5wD1dnI5fziLsvBndq2jScvBr20XVpMrORQ/ K7+RlP1jWhlfoE3WMm9DlShpq+b67vP8JxySbeY8JJtG61W5re8TMFrDZXbnWJOt 4QVPZgEO87IX3vyrTu9XBmJ/vknv8NY1khUXpE/F/ONWZ4wDltEGOOr8jDOWCp8= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/globalsign_dv_g2.crt000066400000000000000000000021361274666402600234030ustar00rootroot000000000000000‚Z0‚B  /NáAC0  *†H†÷ 0W1 0 UBE10U GlobalSign nv-sa10U Root CA10UGlobalSign Root CA0 110413100000Z 220413100000Z0W1 0 UBE10U GlobalSign nv-sa1-0+U$GlobalSign Domain Validation CA - G20‚"0  *†H†÷ ‚0‚ ‚±£ÍÀß3@&ëÞZ×”fÔcÌ3D‰àâ¸ÂG ­i†¨sB ñrû-¬µrƒ"öVç.Ågq2¼ãí.E©æúÝÈŒƒÁoKÐ&J öEÀM~“¼ '„í0£éÆ&&Ý-Ø‹ÃÎÐ[üŸäØâ5ä h¦ö £t`B²—‚$ŽA¤ò.^¶Ž§nÙl ;$5jЫ[j÷—?Q¦§nsÊw v|›¶0œ÷({‹GçŒÆÉÈ»ÏéÜzA.¡†ÚÔ9²â@¦¨:úSOìn˜ Êšw³U……é.µ^TñJzl9ºn4³²Bá÷óœš DÞjxޱO£‚%0‚!0Uÿ0Uÿ0ÿ0U–­ú°[¹ƒd*vŠiÚBÜþý(0GU @0>0<U 0402+&https://www.globalsign.com/repository/03U,0*0( & $†"http://crl.globalsign.net/root.crl0=+10/0-+0†!http://ocsp.globalsign.com/rootr10U#0€`{fE —ʉP/}Í4¨ÿüýK0  *†H†÷ ‚:çü®¯C€'uA_¨ð(ƒ~²¸º®u1'ˆ¥å¹NCÒ­è£Û0žlVÈñB?wþåmžf«Ú²ƒW´ "Ò†¼Ú2×Àíp…|“ªð—Ü9ÒØ‰ë£¶P%ËlÙ¦ÃoûˆT¸ä’p‡Îy;ðÞ6¿=ùïž©g¤ô†>#—¸*qâíþiˆg¿&\certvalidator-0.11.1/tests/fixtures/globalsign_root.crt000066400000000000000000000015711274666402600233670ustar00rootroot000000000000000‚u0‚]  KZÔ0  *†H†÷ 0W1 0 UBE10U GlobalSign nv-sa10U Root CA10UGlobalSign Root CA0 980901120000Z 280128120000Z0W1 0 UBE10U GlobalSign nv-sa10U Root CA10UGlobalSign Root CA0‚"0  *†H†÷ ‚0‚ ‚Úæ™Î£ãOŠ~ûñ‹ƒ%kêHñ*°¹•½ðcÑâgfÏÝÏH+š¯)€e«éÇ-Ë«Lp¡= 0ÍOøÝÔŒPïPîÄ.÷üéRò‘}àmÕ50Ž^CsòAéÕj㲉:V98o<ˆi[*MŧT¸l‰Ì›ù<Êåý‰õ<’x–ÖÜtn“DaÑÇF²u†èŠÕmlÕx•¢éÈ 8ëò$OsT“…:¼4µ‹Œ¹w‹±Û ‘« SnÎ{7t¹pG‘"Qcy®±®A&È+ÑFªHÖd*׃4ÿ,*ÁlCJ…çÓ|ö!hïêòRŸ“Ï£B0@0Uÿ0Uÿ0ÿ0U`{fE —ʉP/}Í4¨ÿüýK0  *†H†÷ ‚Ösç|Ovп캢¾4Å(2µ|ülœ,+½ žS¿k^ªH¶å£³Ê=aMÓF ³>àãcUòºï­9áC¹8£æ/Š&;ï PVùÆ ý8ÍÄ pQ”—˜ßÃ_”ÕÉAœÄ]ud ÿU0ì†ÿ ï,¹cFöªüß¼iý.Hdšà•ð¦ï)±µ ¥þi,i$x³§qbîÊÈ—¬]ŠÂøG†n*ÄV1•Ðg‰…+ùl¦]F ª‚ä™QÝp·ÛV=aäjá\Ööþ=ÞAÌ®cR¿SSô+éÇý¶÷‚_…ÒA۳Ť€o ÉÞ ˆ ÖfUâüHÉ)&iàcertvalidator-0.11.1/tests/fixtures/nist_pkits/000077500000000000000000000000001274666402600216545ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/000077500000000000000000000000001274666402600227745ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/AllCertificatesNoPoliciesTest2EE.crt000066400000000000000000000016021274666402600316640ustar00rootroot000000000000000‚~0‚f 0  *†H†÷  0G1 0 UUS10U Test Certificates 201110UNo Policies CA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1All Certificates No Policies EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚¾–!ñ„¶iˆ/<·ˆ97 E¯õož]WþwÖ ÁÐìú;£Ý>€jFÌÌŽ'ø€Ä¤PŸ*CätI59HÁùw› S¨m½øî!½LÑX©ÍÚ[ÐË0øL„»Ný“ °«µY¹}¸Äõ˜ ² 'ŒŒµÖ!¯®°]+Ö¹´/¾ÜŽEsìt)öÿT„¡ÿ.ý5®:ú ƒÄ%ìÉ´ºþÓýY¼ƒÝ£ÒÐ_×ÿô3hðmU\ÂY.¡ÜJ¬\ù £—+ä×CÊ6çw½NQqºòîA‹‘ogæ^Ø@MÊ+¯âJÖêçRR©šì7CìøHÜÇ£R0P0U#0€B$í¥Kvœ—˜\tê:ü5äœ0UÚM¯ô¾dYT±€X‡$XêÅš~0Uÿð0  *†H†÷  ‚Ó…:G‚·l¼,L)}“MêªhFrE€û¾f”érPí„Q@•yò¼yŠ1=Œ n ®M‰8ÔÓ‡¾Êôâc‡JÁ›±t_°eÊ÷L°VìQ$å  ŽÓFq¯d'Ú>ù½ ä>9ëÁ<$PÄ}Þ\‘<&¤»(‚ÿÓä’@#a©ÿÅŸÒŽ¥Ì!A™\· –õF´ ¤{Lñ“V¹"âvÝ@z(nuý!ýлƒ÷ñ51Ÿ„¯ ¥r-Àu§P¾ÿB{yv!ÏÔÐÍÖ˜ý>€Mœra"E'7!q‰Eãƒ,ìQrµÛÕÄc×ÎCÏ'³´K‰øw$x6/ ( gÍcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/AllCertificatesSamePoliciesTest10EE.crt000066400000000000000000000016551274666402600322640ustar00rootroot000000000000000‚©0‚‘ 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UPolicies P12 CA0 100101083000Z 301231083000Z0m1 0 UUS10U Test Certificates 20111=0;U4All Certificates Same Policies EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚Ð"ûŒxØrÀƒ¥i½H“Jؼ3óþ¦ù\u¡¹öTN«):8¿´ýv×»á-º› k›³ ¶Ç2P 7E µŽ<ê1C2ÇÁÛïÇøão•Þk4Ú ¦Š1O½+Yl‘»@sO=moHY‹Ho¡Ÿ”jÕäÅ/0@p®eÖ?Çå㌄§î„ŽŒö¦}Ú*O˜ÄNçHóÄumon58ið0@öòÞŸd'B™;[™Ü!Ñ8e] j4µ9¨}ªúÇà…df¢-[‰\Í©ïMöܪÃÖgäçÌliÿˆœ=™‘²>ˆ\¦mòEžàƒeÀqÕSÛ£y0w0U#0€Ø_5âšÁ7*&΃Ìsp*:â10U –Þ`^EšÅG3µ8ôþ ·0Uÿð0%U 00  `†He00  `†He00  *†H†÷  ‚+¼’ )óK£p‡jø×‚Ÿ‡¥TN¤sL²›A&ú)çD±>»ròã¹6Lpù°`yÔŒ?(grŸÒ0zÖå18÷†çŠ7r)wØ`Õf]Ê<úM5ÃÞàF¥öÚzV߃t 4ˆ!<\÷\” 3y„Ça™Äy¡ {S%Âýœv 7M¤¦2?(g÷r‘4Ž›»î ᙑ]œZï"ßœZFºì×n‡=*´™ûˆ†•³º.{2¤¼MTŠp˜Ú—Sds³ÂÒ’PDü‚ô:<*¦ß5›TÈ¡9£-2¸4ÔOí¨mh¾Mn?'UA¥W„‘Lµ‚7»9Ó°òcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/AllCertificatesSamePoliciesTest13EE.crt000066400000000000000000000016761274666402600322720ustar00rootroot000000000000000‚º0‚¢ 0  *†H†÷  0I1 0 UUS10U Test Certificates 201110UPolicies P123 CA0 100101083000Z 301231083000Z0m1 0 UUS10U Test Certificates 20111=0;U4All Certificates Same Policies EE Certificate Test130‚"0  *†H†÷ ‚0‚ ‚º‰ç|ßmá×OgèšÛ¤U˜Dì,¨!‡+‚‡Ï;7²ÑÓRó;ª‘ÅaÒ1W}Æ­ :¸ªÝ}l€“OÁäí³LÌEi üâlTEú `ûßD@8ÄãñgÜÔÕz-¯ëØ z·ý-X˜—Ûi>ù Âñ$·¯Œˆ Y/ã`rvúÈëÜ•­A¤æ•S]°×¬WŠÁá:R’j½U ² îÇéÜÈ{­Õ,RSwå7°Ž‚(ú-ÈSÆ*9÷¨ž‰ðËÑöŸ¯ š»N8å ®'ºˆ PjÈBo ²Ñ®m]k½ ¤Y&CûZ Ë^ÿZè‡Ã£ˆ0…0U#0€Œ( Ú bî==–¸q“‰êèc0UäˆôQZ¶a .6+FwÙ¨j0Uÿð03U ,0*0  `†He00  `†He00  `†He00  *†H†÷  ‚yµ ÿfþI̾›Âè:U’ËóS, …·ït¹½&Üæ.º3êKèðâº":§gn‰5h”(µ~Ñ¡‘Ñ?Ÿ/ÇšmhändtÙöjÝ}FÁ¼Ò¾ä<C dù±ý¯ õí-¤”Š»u¬ãdð<‡Ï®.ë-–ôÙ÷kÙVoáRåRÒäÇg ? ù’‰øPJÓ¼ÿëÑ+ gZ‘ö‰¨À#E{¡]ºÜ ßž¬x+R±‡$E¦9èôX/·ÑÖbeû!‘:ê¸Ö‡J"‰EF¦à¹ö0T" ‰¯Ž™>° áv3YïÖ‡ÂS;› ¡•³yw>Š ñ¢±B‘–dù¿ fŒ–2’^È\Ã7‰kô|W‘ç+ÑCZÙmâÞbãPq´'  ³ØJýò¿ÅÒÉíMÔš= ÐôÂÌ·Ô*WoЧfg…hŽ”*Fª¯´L¾¬¦tŠR?Ès·Ñ÷¦Y Â_qg™8«&“ î,+å2¶˜trÞˆü\yÑSõÌAfUŒ±ò5P4©£e0c0U#0€»ÉÞÈ•çB⢎®\«$`~…0Uý1î¨oò8H?ŒDË fm«Øé0Uÿð0U  00U 0  *†H†÷  ‚jP©\Y”ºâÈJ§B5nàë8Þ–Ç"«47^|Ƙ t\œJežu™ë1„±Á¨ä&%—Äe ›Ý9ðÃ7d¡š#½±˜UªCÙøó.ÜÍa5Éî‡#Níy嘢³Yp)jËÌŠòý¨Î™5­2BØÚÈ òþ’ø?]æë çA‰¾Å®/ œà8¦\|.™BÉ$T8ºO•<eÂZÖÀ³Ä<ÊØ{Úí¨j3â’ìsüIb6Ï9!!’¹uUØR’~¡´¹Šº"'ãØ…a@ÀÖ-ɧÞÔýzâØÞOòmCš ÍÇ¥›4dñ@ÆøoÕüޤ<ä \jcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/AnyPolicyTest14EE.crt000066400000000000000000000016071274666402600266400ustar00rootroot000000000000000‚ƒ0‚k 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U anyPolicy CA0 100101083000Z 301231083000Z0X1 0 UUS10U Test Certificates 20111(0&UanyPolicy EE Certificate Test140‚"0  *†H†÷ ‚0‚ ‚ÊWŒ}a,b¢+yçÝ w PRr0¥ÃMå>f>Í·ڢº.øòQ?áOT*gV—Ø3†; œ ¡è;T·¸4.X3¹fõk,³ý£'iwyßÐnÕ-8¨m_g@9ñ† …=døˆ™_~q„ÛM ¦â îêæ7œÀ ‹ùîRŒ;£8õG$7‡¦. [‹¹øÙIvñw:×ùÙeÊ'ª–L–"áf½I#QEKõ‘ªwÓú"û)Kcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BadCRLIssuerNameCACert.crt000066400000000000000000000016171274666402600275600ustar00rootroot000000000000000‚‹0‚s  0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UBad CRL Issuer Name CA0‚"0  *†H†÷ ‚0‚ ‚Åìo 7aüÆ·©P¾µ_¶á‡'ayª'ñþ©GêA8h‚ª#¾ìä:aüäUöQD•Âõ,jÔ~„hÔ”g0Wˆ9„1ÑÍœ2 ­xûà ŽdŒ3åAÚœÏs¯ˆÎ3˜—ôF[zÎp±TîöpF'd3—/‘*Y ûûŠu¬¯¨gVŸ˜Uü« ¸-í·êî˜Í]*ßKÁzP9»×öÏŽ¯¢RX ³…šóÃÆ´Öàò0ÉÛÆæxZÖEºˆd‘¾_ 8 ϾqoÅ‹åÕK„‚Ь#šw2×ç¢Å£jV÷’aÅåИ¹U_¤Ñ¸éRÔʺçBé ¸Mp í£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Urò5]ÕJ A(ý”pq0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚+,ô«ºØ‹ƒY«€×øÞ„u•²å­ó}4U£µÛörÓ»õª—̘y”ô¨…C;#ùÎô23 î±O&L³ŒK£‹gyÿ…^†½Â äjŸÅ¸8IŒ³hÓëOÕ.þø2¯ã³›ë è ͉Șj®?2âsìÎ+>L®¾X‚ó¡iØ÷¢certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BadCRLSignatureCACert.crt000066400000000000000000000016151274666402600274440ustar00rootroot000000000000000‚‰0‚q 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0M1 0 UUS10U Test Certificates 201110UBad CRL Signature CA0‚"0  *†H†÷ ‚0‚ ‚¢˜Â¯dxP÷€«C±Yü,NÞŠe+DÆÛÈBú(½¾è¼dä4£Á õuÓîFf-¦LÃuüBnXÊ>Ÿ”ÛÌ¿ôÐF\†/ƒ¥_ §ò8,ù„(›±=`ºnqÞRñÎA…û•É‘L,0@`ä6>5ÉI_ŽðY©rº[œ¸'m·¬9Òw K(ÖÀ呟†týN= N©þm#ÿL×ÎwËîf^ûÞÞ €õý*`[ [ÁÕ;Ù§ŠVCªƒ¹tyñóNX)œ©«— ë>G=Ú©³8³…<3çºÀ¹ø‰n“É£ÃØÍ2zcm'œõÔÿ4HÞH>:­JSo£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U1‹5žDa0Þç .H$Ûù½0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚,4X@pæýŽIØU™;ÅÌá‘ôƒÿL^ ˆ†ñ°B *³­©pÉDZW&LS”¡Äãjoâù‰÷êí_`ŒyfÌo=é]‚Ø]: A:¾Ëžt¨åô›µ¦ôëÅy°–àŽ¥™uï^³fùM)&ÁQA½½þž¹VÝòŰ Ÿ‹_´?©b@=ÔÐÏs$ISþò°Ív¹œÚïse& àˆ·ú${çì—tÞã¼,ɪ£%øàéŒØ‚S"àN(¬$¸AnA„@BÊÏwˆú—¸›ž¥@Ú D!/žeÿÇ{ÿÐŽNSIK˜N¡©æDö›uU A/certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BadSignedCACert.crt000066400000000000000000000016061274666402600263530ustar00rootroot000000000000000‚‚0‚j 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0F1 0 UUS10U Test Certificates 201110U Bad Signed CA0‚"0  *†H†÷ ‚0‚ ‚ßï¼ë«÷w¾z½‹ÊüN¹þlËàY$O°AÍRy:Bvwf/vö€Êþœ"JÒ½é%üöäpqmák*Î\E/÷÷)Àˆ h>§Nt(²è@„¨ÌXëÇE9÷´0¥ã ñ¦Âé¶©çêAÑT3ªÂ„&Ø¢‡\ò8C< +Æòý™ÁA7àZœIˆÛ^Õö*_°Ñ„Äâ¨Ñól>k‘3•ØÄo~ÜI¹>Nå¾Z¬ì½À\Là»â´‚¸Y¨¥î±OÔz4ã¡™ 3‹å9×ÆÞ“ÉbCÚ¢©-Kê…ZñÙд"`Á!¾Eûb ™OÍ<pLÐ!+y£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U{Ý;JàÈÝD…Nˆ2'¶VÀ“¸(Íi£0eO–'¿k¬òF0e…vcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BadnotAfterDateCACert.crt000066400000000000000000000016151274666402600275220ustar00rootroot000000000000000‚‰0‚q 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 110101083000Z0M1 0 UUS10U Test Certificates 201110UBad notAfter Date CA0‚"0  *†H†÷ ‚0‚ ‚ʜʞ3 ô9Û ËvÔÞçŽJÙ±Õì©5Û»ž)úѨã >2ÑñšŒ$W¯§¼‚O–‹„4¿°i¹„nüeGw"q!`ãKjß<œ±V|×í”0`ã©V%J*4¹-yû«hÞÕUÜSÜÚ¤ÕÒÞ#qðƒ gùÉÐo\#-;Ê*}¾HOTÉÑl¸Ý<‰/[½ô˜Ü¨,ƒŸoSÒfÖ¹‹TšÆa‡H¼OuæÒP'^I¨{œ5û¼^N»©-3º¿7>úY˜JEIA„ìg§Ø)8 #.9‘SÙÅúvwÄŽV^Z‚ ¶„šè“½KÖ®FâAÁš&:t>$É“£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U,ý÷î<ó¤fì矈³âÏtFØ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚¦ˆÅYÃ"K‰9æÀ’ßžc}ظœ×'Km6ª5%â{øÝg¤ÝÊÈú”{ËÃíFû%ˆp-Lè/0 uŽé}z*mB (%ÁtªâÓ%îU”eyØÚJú¨É§r› ݳîhé5_X¸U1Ì^™;ºëÑ9Xd+Èaü¡¾Ä°úD7Ä ý}M±«ÂŸ;¡m•];ÁP—¢ôAXHj@¶Š9t¿`À²I/†õa×AÕ¸ øû”ö®/ÍÿìÔŸlιŽå ®©› ¨p"K8÷qhj£¸È%—òCÖâe•häÙÑàIm¥ëôN_¸góªfÞ"³§G(€Öžó{‚ªf´&certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BadnotBeforeDateCACert.crt000066400000000000000000000016161274666402600276640ustar00rootroot000000000000000‚Š0‚r 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 470101120100Z 490101120100Z0N1 0 UUS10U Test Certificates 201110UBad notBefore Date CA0‚"0  *†H†÷ ‚0‚ ‚§S—Z¡Ç˜Fà¯yuPuë-‹×å ù£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uc>¼žû¡òY¡/K•þæÞV¸†@0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚¶H,ÎÂë©!ÿœIÃË«FÀ7{Xè:¥WËxåHü£®·ƒ7h_¬# Æž×qÒF3ô–>\ùËk¿ª1\zûíö~H"Û—7Á½"6’³äâ¦oŠ­ÀC©(¥$¢W—¶Áã„ÝjÉïÚTy/g±é8—dÝÿL8¸*h›­¤úŘ߯áÿ2¢XU¡œ…ª¤v2`á¡c4ÌÒMZ>‡ÐE„ X6ÃYa=ßÛ#8V»£â¨T½“5ÈéÜøÂ-öå:ú‚ÅÜíP±k_5™÷øèÃÔƒµ6WК#°yl±’(®;íÀ_[ªÄNãÈï-Úcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BasicSelfIssuedCRLSigningKeyCACert.crt000066400000000000000000000016351274666402600320760ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA0‚"0  *†H†÷ ‚0‚ ‚›Ë‡‘è[ɆG5ž%¨”.ÛÁ7£%Jì’¥ÞÖO:Óã¼ h³[”©°ž\ž0S;ûäv>nư ü4á1ÄšK³ ®éóÞø,ÂËì¥fß*ÿy¥4>sâå‡õÿlQ+ÿˆF¦œžÝªYÅr‚ƒ×êZ2!)}Ç@½[Y$X’Y\ÌÂ¥Yº¼j:©KVE÷b%®)ÓøwQýØÜÌ &:mÞ*`çÇzDå¿ýyú%_T=­®À`\l\!*ÜH“õrë*ÉÖ8s¨PdÚ9˜ÁÇ…ü'Õ»œŽ/èmü"Ô¦¼ l»AfÁÔÏ_¾ÎÝ)÷£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U)šE.6•ìò^TœÕÙöD‘,0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚•†i;*s3ÛÉƯ†2¢Ÿ ¨ì]j>2“CAßÔÌI«aÂd¸Uðé•»?s°ùé=â‚ÆQ+á æ?‹„ÜkÑ0!Ü2_¨#¶‹RV¤¾×Yk#ÖNdƒÌðÓl è¤‚‰D/JJ³ß’º÷¥U Nþ¿?ì÷½WÉÉ/Òñ±·CÊÏQ»-޲÷i²®"»ÖG̽‘Ž'$8Î×O™CóÕªha‚$£Úñît… ÔjµQf,››Ž7ßšµ;ŒâªôE~Å @.eÚ9Šû‰UG³’ˆ6»§ †~gá—Iú—DMöÇ0#Pp—HQJJ0æzVcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt000066400000000000000000000020621274666402600322260ustar00rootroot000000000000000‚.0‚ 0  *†H†÷  0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA0 100101083000Z 301231083000Z0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA0‚"0  *†H†÷ ‚0‚ ‚À{$ö:+¿±ï—bç¤`’òÉÜEj+ðÈA±fÁúéÅ•šÖ+½ì¾è8ˆíý%çñþS{øÓJ½´Ïpœ²µY†2KT÷/d¿šœl°é;æ²"ޏ0$þ7\Ï@Ã#i4ÓÒžÛ+Á\Ÿq}ÖD7x\!éGøµUÒpS=×3SEÞ¼a =7†N ©p¡j9qH€±O$$ڎ;„›é†÷“OšÒõ…l°xXßuA=…¶Ê´Öùáu$ÏlS“ʸóñA ôA^Ø ‡.;“ƒì§Iœ V„?g©®Ì8æ Ÿv•}ZZŸ†!ùAX¡Ó\½âA£ø0õ0U#0€)šE.6•ìò^TœÕÙöD‘,0U$ÁUqúžá!…*ð­a§¹ÕMC0U 00  `†He00Uÿ0‰U00} { y¤w0u1 0 UUS10U Test Certificates 20111E0CUxkžV.åNYp@Á5é®ÚÀ-UÅ”Z!09ó M¡”6<ñ?DÎþ”;VÑ‚‹ÊVLœdvZ±»#†bŠEJ<6certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BasicSelfIssuedNewKeyCACert.crt000066400000000000000000000016251274666402600306670ustar00rootroot000000000000000‚‘0‚y 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued New Key CA0‚"0  *†H†÷ ‚0‚ ‚¹\Ñî>¢eckm>]Ó3lýR>ŠeÆêê $À]j“¥Ñ³ËTP"‘Ú}|1ë~N´©b4Ø0_€ÍÉiá|×H¾\ß¾Z(‡ŽDª£äÜ·+¤ülh.±˦@r=mï^ò]¼ÅNÄ›+ΰŽTsªÙ ™,PV[Ô»×ÚZWéÄDO±)½†,ÕŠÚþ Ç7yøî¿«€™œé±Ä4³IzÀO5Mg©‹PÐÚÐt+`Ä÷ðÈJ}IÎ a77¶ å¾Í}§^Yn<èï(Bú3ol7nüŠPŠ{gE\ÞÕV†'P¿KµYCG%zLâtZ;£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U üÀ,ëUî’l©é__¢Ÿb#•0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚Edû7ZÎfޱF“ÈSüÈ­®°Y $BJ–³boNnNo`ˆš±PÈùñ´üz6Q“×uÎT×BÎèî$õ¸=ßsm:¿®š'W+»Veµ¼ &»×©Sx}U¶ê“º¥úÞ`d!!Ñc´Û;ò©/·%kÁ Èò"ŠtéÍ£n«T†è„>È/-r`ÔÄn-ŽŒ–¯p}yèVDGw- >ÃKž±—Õ±^¬ 0ñ/Äl)†ÆÍJ˜x¨ò3I¯ÚËáÖ7èGsîpZ +ÄrÇþÅbGK¹Ú'Iib"Äx è®ù5Dõ—{`…E¶§&õs×Ô3§¥Æcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt000066400000000000000000000016451274666402600326360ustar00rootroot000000000000000‚¡0‚‰ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued New Key CA0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued New Key CA0‚"0  *†H†÷ ‚0‚ ‚ÊæZJª ¤6Øu8æ²,VE ›…eÏ;‘ƒíL¬iŽâ–ÑO^Ê•¬ Ï G€«¨¬îÞ÷‰‚‹7$\m¿ze§ ’?$´Î¥#ÊÝîÆŠ…šÞåR¤½9€'é‡ÄÙX4ëÚþl ‘F—ÞêÄ›‘ª]üW나'ˆÅ˜±æéGóçl'{ nüv!™‡>÷&‹Ü ½zy§<Ämª¯Ó'’º0z)±ôä¹/{¬½iì¼/ÎÂë—Vßnõ#6úÌÕƒkiƒØ %í䈧ßÂ7»PŠ!¶IÓÉÁ} <’/°Iˆ®ýî] e •£|0z0U#0€ üÀ,ëUî’l©é__¢Ÿb#•0Uv|Ød4 Oßq!t ›6¨‚×0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ «᭣qËv×bN…P£½Â6 ÃÑáÊÖ W½ÄøÍ”z‹æªc¼-;çGšô@^xqŠîMlb¹`ÞæwgX*HC˜c¿'?‚kî’ßúL¨ 1¥ißKÈãkY¡tXh#¯ž¥gØRQÝ Ø80g,ÿ…#¼z5šó:-j°|‹fÑCÑTŠ'Ó˜¨]5}5 ÛY˜'OîƒÚk2p&Ž:èµ´#u}H@,Ô ޝ³X ¤[«hm8´ Qþ*°ÔV"$.`Iå ìáëø9÷V©ŽÕÙ 9Ç“úÈl-ãMÔ©D¼WÇ U¯lÌäi9õê{”certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BasicSelfIssuedOldKeyCACert.crt000066400000000000000000000016251274666402600306540ustar00rootroot000000000000000‚‘0‚y 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA0‚"0  *†H†÷ ‚0‚ ‚Î7ÿ¸… ¼ŸÜ§ÓìÎ Á†„è‰LilVñywv›¢¤{# ¢†hŒâ’_`æº {õ³ݕү0¤\ÇîéîÈhö'Ž ,œÄçÖ½ Jõ&–imÜicuéj«Ø_þU6öÂ÷ltÎüw|BÕ†X^*×Ú+œÛZ@b`ã‹‘Šr\XYûˆ£0-†ûŠ–¾<@,!u®ñ6Üw£,×Õ$ÓôÑÄUÂà¥våá‘–Å.öš“ûŠÞ÷ à6±Ân8u%þAa¥&’lF&«§0}Ñoè‘VWþÅÔi¡žÈH z„ÿßõ£B×¶_P1n-÷,Yæéè£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÝ uShÄË@À†0¡¾¯0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ p­7ubÚWáÖ!jÍä(7Ò|÷ݾ9l $(BÃCi¡{>ñªf\ÓšyàPT)]qžKø¿Fæ¬5ÐÆ†š…:AëжËÝr…_‹Åç8žH³°p±åú2fZ=—Ù¤{ f- LŸÈRs¤dèd?®‹‘ß/”ý¯bï@nWÏL=PçœCkÎßúx2a`™¿ð‚õ̧N€à0gÚ}½È<8l¢TKUÊIÖD+cÜÀNªïmgtDç>ÎM<Šæ5Ò÷'GÄÒa›Ä”O] ÄåXÒ*1Ù|DX¿ûÀh·±•j-ÕƒCW`)ðdz8Ècertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt000066400000000000000000000020531274666402600326150ustar00rootroot000000000000000‚'0‚ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA0‚"0  *†H†÷ ‚0‚ ‚ÂpO0óͫňD¯<‰Ê´'j†8A1ɸÇÅÈ+%›H§ª( Ñcê‰ «qnO¥Y!$ë逗WK9Å[¹žDôp ŽB2bÒì0%µ4Ç»ÿIyÃUì}%D¯ó"w˜l©]‘€* sÞô-¦F÷or‡ÔT–$9$¬‘7ëŠøô± ݪX›D1ÿºßÑp5Ç)Þûß°”à-oÅü±Ì ®q´:å ô RÔ›üÏ»…¡L$“É Š¬yIÖ÷I‘°üã·‰Ú—¬áµšìnµ{dýyhj=qhÃ!—Çpu©47"!³ ¼«ëÓíßY £‚0ý0U#0€Ý uShÄË@À†0¡¾¯0Uˆ_¾?59fšëMÂ&&±*'µ*0Uÿ0U 00  `†He00Uÿ0ÿ0€Uy0w0u s q¤o0m1 0 UUS10U Test Certificates 20111=0;U4Self-Issued Cert DP for Basic Self-Issued Old Key CA0  *†H†÷  ‚k-ÂTMõßÿ(¨¾ñ#b ¢áˆ[’Œnc@§÷ÛFéw€œí‘6a{M¢N Ó3çPUM’`’7‡hȼÿ^)êÏ‚’Á•ð}[™þñìÜMk &NÄÔ²ìy“ñdW"ì „&“Âú`… ÔP¨º}Ä0R…g2ô :tZ>f}ýW*Øt #Ãà¢åþ§ü…ò0÷í˜ Ú›ÂÝYvŽt—µUr*Dq"[Ͱ‘)MF%íÇ~j&zìkr¥vE”ÚyŠ!±<úÙ;7¦ÉnÕ­›X\’+–‰ ë>dY™ƒWTŒíà%`P¿„5certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/CPSPointerQualifierTest20EE.crt000066400000000000000000000017631274666402600305610ustar00rootroot000000000000000‚ï0‚× 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+CPS Pointer Qualifier EE Certificate Test200‚"0  *†H†÷ ‚0‚ ‚Ƶs –5"ÃÅÜ«:,i$Î4_i²›…¤QšïtâÁ 9ð÷‹«_pl È&dv¡R£"®K¼öâ¬Äç „8ÓÐÂ8´ä *`°H#cÅO½æJð¦ýBêøV«óØpÖÇ«SDzÛù]Ý]Ïì.ðWsŰþŸ(A¤„^çŸgçÜ,4`ß‹aØg³>­;C³¬DáËû~I«LLø›¦ÃRHÁkÀç´Óñ¥ ®,TúR^ÚÜ+»gÑÙa‡ºRpß9 õ_j™¿Qß)Oî }ZUÀ±§zfx[EÅg p㢠ªMšS0‹8&d¥Gu¹8§ `³?£Ï0Ì0U#0€X„$¼+R”J=¥rQõ¯:É0UîBÐZv©fVˆÁ‡˜­ÄNH½Ãã0Uÿð0zU s0q0o `†He00a0_+Shttp://csrc.nist.gov/groups/ST/crypto_apps_infra/csor/pki_registration.html#PKITest0  *†H†÷  ‚j?M¦äŸà*À´·=ô%¡‡i†¢˜.çSÇÍ|ÿÏ“­´;}ºPf¼sXrRÙÞ¦{cÄÿpÐ/–Ôþ›­Éïùñ†Ò+¾EÔɘ–H]ºûdqCÁºÃ0¼‹Ž{™ÆF‰ºca™È³¬$;›¡ôV©0d³Ú²+mØÉ¤PÁàÄ"2‡áZÓã¾FÞáÅÿ¿‚F¿mO¹¾.ýá C^³ ߯ ™ÇöÎ,ç:!ŒC_kÜÊž³¥.2¼W6cV¹:©ŸE«órDjf´~ò.ã4Ãú±”ˆ¡Ûü³¾Ÿÿ†(˜\ÜHr"áî•xx†certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/DSACACert.crt000066400000000000000000000020251274666402600251360ustar00rootroot000000000000000‚0‚ù Ñ0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0?1 0 UUS10U Test Certificates 201110 UDSA CA0‚·0‚,*†HÎ80‚ßå>Úé¶nÖêâ:°G½DÇVÈÌnÐ3„VG5=öTÈã­»ºuó/3 ¦ù1ìgãå™mü)nªWˆr4âŽà£¬dŽÀö<´ÈJH0^ªœv& Ûs3ƒ—Àųæ7õ>ÿ Ô¡.º1ø«‡Ø Ìw˜Bn¬“˜Â½.{4 ÏØÿ‹ëéö\–sý–e:/Ìá|°Î’_cì8»DºÝ’4¶^¾e{Øqwìf|;ζóRþ’UïN«]š./nVópìjí›"¸¨Ë œêÁ Ž!&D¥ ù ìbàp1Ìhõ …¤JnyôÁù6Z8oNï„SßgýÌ÷YbœœÍ\¤œ·ì`ó¾¯~9˜„€&ò¾¼F¹äy¸%s‘Ö,' ¨œÉïÚÎ]ò½;»"‚0¸Èù¡/aåÌZïÁKÏÑO§|kgß¶©÷2raôǨ¨b´øðˆý»ã=kÛ¶Û]T:…¶÷=o‹7Gó͈ýlDRLXŠ·”Žqõ¡>*þp?%Ÿ@«q%@›§¹Ç£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÆŒtè{ ÈYÇ}<[TY`% ±0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚NBŸUƒht5¬â†¬´¹]*6œé^MÁˆ¢Ÿ”ÏD^âlÊHºë®£ûÊÿÈ 7™Ó·8Äq)cε 9ð\Vð¾F~,0¦¡eQ;ÈImô•”½$¡¯± .U3…ë@¦àQ{7­éè(Ëûežørü3j]ØíHw„òòžv†èÍ©RÖK…•Ó3›vó\öôÛÂÿ…Ë—<¡lI@Y/@{2j»’éI.W)/#[º¤“3*žXù'egó$møÌ|ëÙ†àÞ(‚ã•ÚLǨº_ÆÇ‡5á¶–ŒJáõF%ˆQ '1| 8^¾œÌ‡ëãè5–gq™Tô5ÙÔæ%èQ£k0i0U#0€Ø«, ‹Ã’ÜÆ­j?¿óƘåÜý0UÃoU¬6NÄX `À¿"–È]û“Õ0Uÿð0U 00  `†He00  *†H†÷  ‚£â#Vbº2·/Þ¦³ß±Xfâ !!±&¬r’ƒY¢.Ãú,dl~Å=é4î(<ã1ú­!ÓJƇèž³VÌ2XÖ¥èÐܘ~’…ô^‘¨Æ§{q}Y_GVGcnkÜN Ò®7`õ^ÿxǼ*#›Á²×Úà®h_Sk†Æ øNý©ú}R˜ð­*øal£ËóÇq P²´yãq¯Ï䟽CϳÙKìÓ))N'JÆ]£7 £ì™J6ÁĤ ÕןVǧE¤‹ÇŽ/± a=(–‰è8ÉÿøŸ[0ÝÜËv0Uÿð0U 00  `†He00  *†H†÷  ‚bNP̬Pp»G)RçÉxÏ\§P¢˜ “[`Àý?±ç½Q‹1à·Ù$޾âZŠ©°Û+Ö»yÌߨûáÏ,jkஃŽtŽ#ŽBîâBÓWîõx\áwh4yܲ¡H&ÏÁŠ:%÷ƒç=ˆÙMþ±QŒ¸¤?Å®së(Ç~dOJx§²[ѬUO è ª‡œ„ÝíXaþl„qô)¦†E(¹Š?ç|Û]°8A?éËi+%|Œ·¸ÙË’•€qPZ †$hÉ/¨írï\*>g‡{—å«4rk„’y˜öqñq,{åãµa#°÷certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/DifferentPoliciesTest5EE.crt000066400000000000000000000016251274666402600302470ustar00rootroot000000000000000‚‘0‚y 0  *†H†÷  0K1 0 UUS10U Test Certificates 201110UPolicies P2 subCA20 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Different Policies EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚×;ynÊ ®ÊQ£«ÖªVÍŒ–É×À¼J£—F‡é'C?Ú|14 ¹‡â(håaÇ$\¥Yœ þö±Sø$éw$\u †[ñäMíR¿¤‹¨(jÓ=¨¤Û œ¦Á_á›t‰ÑŒ5U“éèÞ·Øâü·F ¾“Æ2,_ßYÐ{à~3 óןVËP¢·'U/n†Ã'zCœ§‰ã˜9ˆÉU«äðñ>¿î = Õ½çBNÑ×PwŒº.š-‚ÃûÛ”×/©›[T½¶bkCö/}Aà d+|îíì̸õ÷ ,¶™¤ší^¾oý‰”—ˆpÚÚjÍŠŠ]õY£k0i0U#0€,ê¸w=e¥¿3ÌzÒ˜ü¾0U˜”˲:­ñFÄZ‹2+1µ-Rù0Uÿð0U 00  `†He00  *†H†÷  ‚¼ŒÌõî›üÛ =ê’a»dvXxË0OðÌž]DÜËg‹\¬ëjòâ9ROíà­–r¹N„û¬°UN.íe¼¿#±œ,™Õâ²h”ci™‘8öÈŽRûq˜ ^V|,È „±Î5c„«ŠÜö² ÂÚsm¼oŒµQ¢âÖÆÀÛàŽU†J¨ÜæpFíSÄ’ýsbigâçòçiíÇ«òàVGOÈxþè+Îí{YhÜ„öQ0—ÑlaÑ?èv”ûÓýú©áœr`.jµ<þ¤FÎM¥xïÒ纰«D(ËÂ7¸_]÷¨õ!t7ßú'VÓ8æAÐIcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/DifferentPoliciesTest7EE.crt000066400000000000000000000016571274666402600302560ustar00rootroot000000000000000‚«0‚“ 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UPolicies P123 subsubCAP12P10 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Different Policies EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚µù¨„*wõ0ìÄ`Ú#„Þï~3skl™€ $‹ãÙ^Ú¹Ætà°X5­f‰QrLj¥Û=;Å–»Xºî!0>ÖE5Ÿ;ÍŽ‰ñFýkà"ÕņÐÁøäø‘! f#V:=÷ 0ºë)gG&î'`oø '©[xŽC7N(Ú#Ħs,¢ËÄ´&…­W cêIAÎ$·Éõý„IOž³‘$hç 7§ù|x†ÿ'Ë>/Ú,¢¤7ër¦ó~Ûw¢¡‹øØ>rò”½½;±w´vߊ“ Ò{Œä ãô ø4€ï 1öuØ”oËàò?à,’^Ñ c.Å4jÏɨF·æÈ©ØíÑ3áñ]$Â0U™øzÅBÃÇs¸«d©â]5þŸr0Uÿ0ÿ0U 00  `†He00Uÿö0  *†H†÷  ‚6åÔç+  ûHgˆmá—çæ=bŠ&Ïé ôÔFR+¬quûËÕ‚kS–8ÍÊŠÐí©aë) óQ$áI1P(;<®¸Ùddˆ„iLˆ¦•Ϙ:HÙD®ïæ¼ê̾ëÝ÷ñ^*-欱4p‰‚=Ùö—X=K÷¥§{qÒ-Uwó`ô¸Z °B„ ß·Ðþc×1#á¼@M|Ó§ë#ƒGU〈¡»¢AïüÐ¥w‘Ò&ÿHïI+þòmû,ɱÎ6¬ûHg(6€3øRu</’]2x î‚"çtXÞVP¥e%7°—”bª$8´ðí£ÕÙqxKiÇ%certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/DifferentPoliciesTest8EE.crt000066400000000000000000000016551274666402600302550ustar00rootroot000000000000000‚©0‚‘ 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UPolicies P12 subsubCAP1P20 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Different Policies EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚Á™À’Xa]o,ä·ÙÖ…8Æ,M|šˆ|ž¥ëCÚÑì¦]ä;Š<‚cÓ8o—å!åìÄõ‹§'Q° jå< È\v½nœ?[“Ó‡¥.V'Ô”ïS=‹7Ö(¯*`dýÙÆ¢&&ž Ô¥˜« ž€ºÂï¼&™…ûôÆFfÌõ8¬ÆÙ?I2&ºq*Ý4“9v”nk ¥ 0»;ƒŸƒméÓ¥¡ñí¦ö¬ª)‚²ÆAKš¿8a°ý¦½ýÌË$atMÿ®!Lžò•»FQâ­4¡Ú2%Ôï~¦Ólaĵ‚„âjŒµ!wqŒ€ª‰Ç² Ê1½¹%‡£|0z0U#0€Ç¥7§Ðú$å|ßÛò]iÛîÊö™î0U¡oªlS ]ªìô–çô0Uÿ0ÿ0U 00  `†He00Uÿö0  *†H†÷  ‚€¤Ì†‰"#^5h,Ä4}PŽ1¤PDe¬#±O·#ѰµHv‘ BªU¼„ÏD0æ¼ `e7úß±Ämam95åSW±Ãö§ÞÅW]uý5†¬‹)nˆAF]ˆl¼–3vžâÍæHë¿¡†Ûr·à’´¢WM2ô†Ñ™|Í\ |æ|¸ƒYzºüÆ™¾¤Üî…êÍM8ÊI¹JG–}z5‘ºÖúX #ÎIßvëólxr¯9íÇ‹=òk 7F\ØJ†Ò+«­ó~B/ Ês$—7qíÅÁîíóàÍëT€úµU øú“ú‹^¸jú¶§‰¥œ ãdõV›¥kâ-certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/DifferentPoliciesTest9EE.crt000066400000000000000000000016431274666402600302530ustar00rootroot000000000000000‚Ÿ0‚‡ 0  *†H†÷  0Y1 0 UUS10U Test Certificates 20111)0'U Policies P123 subsubsubCAP12P2P10 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Different Policies EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚¾÷¬yÑK‚ÿ/–í,Ä$é—}î}6|}¦b„~AX‚86èAÕ!¹ë¬>©ê>/T *ûH]å H¾h§ ?´ˆˆQ-ûéÊ<5ù¨£YŒõƒ5`æI2À—Ö•GX’r]0ãšÀÐúê*vÓsÒºÝDßìÉtÏä`»1èÀ˜‚Å "wb÷ œ3L(ÙxªaÕ<€ çaŸÖŸ_HiZë<ÕXˆäV–nQ‚ßq Ro#¨Uø†[òƒøCÿ[UIyð×]rz¹+K­ŠéWü¯ S.wŽ£Yt ~BöV¤}°oñŒxÞÏNÝxˆ½£k0i0U#0€‰ „û¬» ×Þ^^žhö9P@ˆ0UãWwóT¾5-V˜ÁÏ©¥Sè0Uÿð0U 00  `†He00  *†H†÷  ‚;ÅÆs羃oŽaˆõ®æÈ)wšÒõK”û(è.®ø-4Šß®šd{Iáâ‘0É…F\jlh„S> ù×_zÁùkñláÚcS>Ñ-ó[ëîõ0Òf4b'„‹ó+FèAÓx!?N¿Hé}$wʉ¿`ꯂ‡Ó%¡µJ!,'BÞJ¡S¥y­p “ï‚`NË ¹ØølÝ.W¨]0—ÔÜø«"^ø[YÛ¬)’÷Ƈ´³§ZTˆœÖ Žž™Þá®Ä¸—M©e^žEÿšÉë#%³Í4HLãU@Ë}bRÍoà;‹õÏùoärC¯]|²µ“&¾Åcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/GeneralizedTimeCRLnextUpdateCACert.crt000066400000000000000000000016301274666402600322030ustar00rootroot000000000000000‚”0‚| 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0X1 0 UUS10U Test Certificates 20111(0&UGenerizedTime CRL nextUpdate CA0‚"0  *†H†÷ ‚0‚ ‚ÈcÓ‘‚èÚ.'íöØ@šÒÚ–uŸ?œ@÷O¦ý Gˆ¨{„ ÙʨÅä,Ñghš¢—BÒwP 9}æ=P”üy`óòPûõŽxÑPœ!|Ȧ’—Ð×{Uy±‘[`óa.lqª’}ÆÇ\+šP¡Ëô¨Òû“Úýw›Ý @.Õ½ûá¡jú ¾Ãjˆ˜5v2oáÊ•–¥i+ƒÕÄZNvײ$âèŒ5ï íb¢ Í„™ÊŽ`ÄøÙ,”ªJ‡2F¸‡wŸÝ®“¼Ìü¬Çˆ’Póu‰¶UkÆN£Ô%ŒÓLcÝ’_9²pC¯vŽ‘ÿû7£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U~*uï 6ÇKç ÙaHGŽƒ,0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ªA~½W~ñ¦Œ\“c†¨Kð}<\"*Û‡DCßæñÿÖA,ÏŽCÂ6ˆn]x¥¯òú‰ºõctÚÛÆ(k%üqÐ7I ¯!ØvÍ8E(šÕ\ çü7Áó¢Xìã5 \·&†ö W* ÞÌÝArkðµí™3!â 3†j q)UÑèfÐzè”h»oðWƒ«™ìý‚ýó¥ý}Fìá.lö^ Ê\óö}G@7²¾Åq$!º‰ÿãoƒTò†¢£2üÉÜ^‡!?³ä’,qãzh˜¿xÚ~^.gå„”½ƒö%Òۭñ-0æQšNœªÎ(llcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/GoodCACert.crt000066400000000000000000000016001274666402600254150ustar00rootroot000000000000000‚|0‚d 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0@1 0 UUS10U Test Certificates 201110UGood CA0‚"0  *†H†÷ ‚0‚ ‚XšGbû]öû ”{å¯}9s mµYÌÈÆÆ´¯æòg£ 4zsçÿ¤˜Dóœ #,^¯!æEÚj–+ëÒÀ?ÏΞN`jm^arØC´ %­§ä丢 óé=\b¬úô\’¬:N;FìÃèön¦®,׬Z-Z˜m@¶éGÓÁ©ž‚Í–RüI—ÃVYÝÞf3e¤ŠVÑçPiˆb—Põÿô}V2i #œ`¦ ‚ºe ÌŒ¥„”S”¯|û…g¨H_7¾VdIlYÆõƒPßtR]-,JK‚MÎWáU¹ýy8“©‚q‰² >e­×…]kc}ʳJ–‚FdÚ‹£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UX„$¼+R”J=¥rQõ¯:É0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚5‡—æu5ÍÀÿ–\!B¬'k2»-–±pAªOZ>æ¶ô>h±¼ÿsd®Ÿº6V|ô=|QG¼=î=Fú„ˆÖðÝȧ#˜ÆÊEN+“G¨ÝAÍ |*!W= ½²l•ûG øM:êøµË+êV(ôb©>P—À¶¸6Žv ^À®ÀPBu‚¼Ö S¦iý˜s2ffµíÌ\þSÕݾ€ú¸’ Èþ%_!=lêPmtt–°ÕÂ]¨að/[þ¬ kÙ ^f'Tš¼âTÓø G— Ú$S¤ú§ÿÇ3QFAŒ6Œëé)­X$€èn c0*9$òtž‘Å«3certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/GoodsubCACert.crt000066400000000000000000000016161274666402600261360ustar00rootroot000000000000000‚Š0‚r 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0C1 0 UUS10U Test Certificates 201110U Good subCA0‚"0  *†H†÷ ‚0‚ ‚²˜–È#âqyBÐùâûžñýÝý¯>s•ÊŸÁg.˜òÔ8Ô“Ìg93Ý!C*“lOµ8k€ÕøÎÑRY퇯*Sº0y a> æhÙ›±1o·æˆYÛpÇq¤×¾c¥|—‚jí¬×ô‘j1j}˜ÞÏ dZ4Pô(‡&]+´`wÚeç«¶ìò@Ž m*1 å¦Å-oe>~c·Y2td¬¬ã®ç¡\i»p¶BQàó& ZÂw¿Ÿ@ð<L³ò•¹ÇE§n+†•rþ¹º‘Ÿ žï>²Mé}eÝÀB¶µ`+qU/ßzŽjÁ P!Ü}"^ÿÄL+÷pGcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt000066400000000000000000000017101274666402600323670ustar00rootroot000000000000000‚Ä0‚¬ 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0[1 0 UUS10U Test Certificates 20111+0)U"Good subCA PanyPolicy Mapping 1to20‚"0  *†H†÷ ‚0‚ ‚Èr1.HÍS´Ü+‘BÆÁJ²Ó{‹röÔtžßA§óà]Uþ ¥û ~'àn™ó·5o€ó»}ŠéÃh í°€Þy¹yÄxFÎêã4Ò‰TcŠI4T8;QéY;âÐá•6>6šJã_s†OÏ_ŠìŒ±ÓM⪉±«ä;ßld¨|¶é^‘D00<.²[B ½X+;oÀb"0>"ÛIê„ÛÜx8ÿç=­_in£æ º7ÇÖoáúÅšÒªºÔRÌ!Ó|õϰ÷nFŒäCÙ%`c°Øñ‰gãA2XLDŽ|™.aº/ðžºyà“¥…¶Ç·ùT“A£­0ª0U#0€X„$¼+R”J=¥rQõ¯:É0U[sy™ã®ÓЦ3Nxä ±äÉ0Uÿ0Uÿ0ÿ0 U$0€0U  00U 0&U!ÿ00 `†He0 `†He00  *†H†÷  ‚"#²[Œ4³±£ @µ†~ØK¥!³n ”Ðñ;§þºë=N²zéq®"­û?×¶_&td?—= š†5}+o“]ŒÅu0Òm¨¢yß=xl,¾íÞ[¡$Bi !óù'ܯÛZúõNxýJ`_Èf¡6C¥´¬M¦¬2ô ²†žžþ2´yȶä^øDξD¢J†_6’¢¨âëÅìsGB¿‚ó£³uM!}ö ·rðQ‰ü0â"{uPIŠÀoÖJŸÝÈhha|D7Ìh‘M¯àcFåJKª¶Þwã^¶}4õf ; 1ñ«ÿ»°TsÁû±certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidBadCRLIssuerNameTest5EE.crt000066400000000000000000000016421274666402600312020ustar00rootroot000000000000000‚ž0‚† 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UBad CRL Issuer Name CA0 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Invalid Bad CRL Issuer Name EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚ÛQ?h7ó£;‹óÌã¯Á·aâïÞÞOÁcª> FÔ«Ä D§l.¯Æ‡Ü’F_¡÷cŒOž)F$›vIE 9œúäm‰oÌ”f³¶E"×pd³/Ÿ ÈÐ×zϽàç´(ròˆ‘‡T>BÌ2ÕÒþ,šñø\x8íéˆOßîü,ÃhòwLaùìˆÎOfé%aÏôù¸?OŸq¾<©“Z;]x\Jd§ò*„Ý\À­eˆ"€>6 ¬%ôÑ—¬—ó3ËjIÅj—ÛVó+^[¿tÐH0w’|™*s}ËzÝ[ ‚â¡6й;]}ÄÔ†Y¿Fʱã2­¿3£k0i0U#0€rò5]ÕJ A(ý”pq0UÉ0jymûé(ºhìÄTº`ÝVc0Uÿð0U 00  `†He00  *†H†÷  ‚RÞîÅý2ÙÌM DEâó”1øpÀ¤œíìtŸ¸ã7éŠóÞaª~òwéÝÈKCa¹øñçÙϧûe4l({ƒÚóx×ÚØë5‘5^,ÆÈôº›»ÈÓ³¢Vbð#ƒP—æ8¦Ã ‡ê/¶XÑHÿ|Pg £Çÿêæ,Èõ3+È€Û_ɰXf- ßNÓ‹¹ÜLµ¡—fíüDõyÈ7Ìá‡(ÕkБe |vÉ«›ô^PAÕÇž«Ö?×{üö%È=Ê‘ÎÆá‘,=g*ò¸­Nïf]uÏh¨o<@õVÁ»&발ɠ™EŸBÓÕÔ“ ^äÏáï6n KK(Œ³JIcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidBadCRLSignatureTest4EE.crt000066400000000000000000000016361274666402600310720ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UBad CRL Signature CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid Bad CRL Signature EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚ª!ÚQkiÿãû&r- ^Ô\Piö c}nµ¬P©kE>Í×ÏùõvðÒÉ÷•±Ú: M˜g ûp¥ ÌÐÌCG~÷>Õð}™jIJ¹û® $¥^û(Á3ÉAC þJñŸ‘úÁÿ Ý5P‘`™š«A&)oç"ª:¥8Þý3é—æ±²ûÞOãØêέÔ}îÿ~´7·³|¼¯O^¾_w«^)×®C8šŠ¼gÐ žW±öã$jOäɈçñà zmšœŽ]pvvëI) UDé ¤ÿ)Åú6öZµd8Yâˆ÷­JK· ¿Òà6üÑÇŽ<ÀÏ/ï“ôE£k0i0U#0€1‹5žDa0Þç .H$Ûù½0U1mâ!~T Õ‘,Øí&± Å0Uÿð0U 00  `†He00  *†H†÷  ‚%ñÕ4¦ölp©XÙïYºªy,ÿ…8—.ÕŽº.á}µú2¡8jîJgm&þ횬ûx÷!Gw>DëçZ„¤å¾Ë±ã¿Ê)¡–%Ó gŒÕ!úÂV£ôŒµ®¼E2vÑ3fMúgxH2g*c3mGõNjè‚ åyYÉ̈8µˆŸû—õ#šzˆœíš@^D“ÍWÚëLÚ\«Ç¡tóš ¤O´‰qG^?nR5ùcu°•eÈ ¡Ä±~Q]»ER‚J¬ÙÿVÖuÞe~ëï$«ÐG̹|Æ"ìx½ÎMí¨~wÿò« ¤IkþPܶA‘¥=†“¹$certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt000066400000000000000000000016761274666402600335310ustar00rootroot000000000000000‚º0‚¢ 0  *†H†÷  0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA0 100101083000Z 301231083000Z0w1 0 UUS10U Test Certificates 20111G0EU>Invalid Basic Self-Issued CRL Signing Key EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚ÀMsäõþɇ¼xõ¯»Ç)GئÙXÜsAïé³Aú;KµÌ‡pj:‡o…µ”ì­%'ó§bâ¸}ÝæÕJôÊøÑMŸõléÙ²þ†GмZïD1u ç^‘ÍÄGuËòAÌsGÍ©¥Õ¿¤}8·|è8…íäNÊ4%Dl4ÔÌ'å½î©;V×yE,‡r…¸Eør[¾cjœ²‹Ó¡úÐ猉°ã°žv<¶ÇMŠúþ$Q)y(°¿-.Aø„WxY0–®ð%_";·'}‡›Ç“·0]™‰¯ÅÍ•ø½Ã5ÄûhжÃÕ÷’¡A‘`æ«£k0i0U#0€)šE.6•ìò^TœÕÙöD‘,0UW‡êW0õÒv­V áÂ$'70Uÿð0U 00  `†He00  *†H†÷  ‚L§9‰VÜüÏ¢cîÎØ ˜,e8·º½Y1ŒÛ=–»©§zÌÖS¼1:Gèÿ~€GFV™Õ›[I½á52»Ì2awit1ÆBFp€?ΜÕAf ÷®®†°Ís ¿Nݓؗ{•ïžsr9«è &Î?•ÝuUß½ …#Wžlƒ8xеƒ{¡Ò®Îg&€¬Ä @z ýô ½"± )ŒÓ3974ë™´¤ó·žÂ~{·Tö —$Ùcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt000066400000000000000000000016761274666402600335320ustar00rootroot000000000000000‚º0‚¢ 0  *†H†÷  0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA0 100101083000Z 301231083000Z0w1 0 UUS10U Test Certificates 20111G0EU>Invalid Basic Self-Issued CRL Signing Key EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚¢^(üö¨Pwæ}«‰HÐnvš“%/Ô²dà¢Æõ7[ 0± ¨ÒA˵§\ÜVXéBÊ>×w'ŒOúN)ŸC»€¹›¯ŒåÝæÖ¥'èÚ Ä+š€Ãr_ÚÎz•C$‰Ö2Ò¸2‹©!#¼æÚ¶²ïÊÚÀÁúö.žŽµÙaíØ½$Æ0í­:š¹P¤P; +„á@i¢vªžuág”¦·•…IâĶ}¬BIW“ø ÇW ÷‰Â¡FĽ`©Þ:s”Ÿ°o¹1ÅPH¬ÏNÐïiÜÖ­²é±ÓÊ&؇Ä–m|òÜÉ¡'Gñ! 8öÐÁS5«£k0i0U#0€$ÁUqúžá!…*ð­a§¹ÕMC0UhÕNåTŽ&$k^¡œÆŽží0Uÿð0U 00  `†He00  *†H†÷  ‚˜$ŠÝ-ˆÊM7íúe’fx‡‹9ú!ûSRçts¨=ŸHG º³i~K«‰'š´)çã(r,6[]!žd~O{Ìo§ {Ýí§k¶Zbclu2ÞIÕöõq&õ†᫞—íÔ•´¹­­ÚªîV"EîÕ‚6ÏØá^•šx×*ÎxNŠa÷Å(³0sªåçgFK œ·~ <ñ܃t@Á’–­r*1?³@øVÆIݹ¸ëد–‰méÃ7ªpiW‚ýd=Cl‚—µ­˜¸ŸŠI•×]“¢»D˜|mË­_mGR³‘p<Œ92HçT%ÔRªâ¥O¢þàçücertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt000066400000000000000000000016631274666402600331370ustar00rootroot000000000000000‚¯0‚— 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA0 100101083000Z 301231083000Z0t1 0 UUS10U Test Certificates 20111D0BU;Invalid Basic Self-Issued New With Old EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚§A§ñÚŠtŠPŸ\YÌ¢kP¢ÍžYC¨Œ½)kL‡í\¡Ïì$ý‹†¿–ªøÌ£î¢e Pok >=o9©°‡r;2XŽ™¡"¶ã¬׿œN¿³Ë ””€Ÿ Ë˶mŽÓÅô¢8Pª ÃôÀîR‘ño¡Ñ~pÛ:‡Å2o´6ô8[Ô3ê€!r±› MZ>¬#k¶óž2Nw¶¤~æ¸6•"¸©[b ¨•bñÃ=yÀÛÒ“Ž"æÊÞõoäö+{Š·EÒà ä£qÉ¡GJ Í‘UËPßhœo˜—†¤> ‚¬ÌTåè˜<•a©õê=¼°·ôE ²À‚Ñ£k0i0U#0€Ý uShÄË@À†0¡¾¯0U´*Ú¼¦NH·\r ê¹`ïØÜ0Uÿð0U 00  `†He00  *†H†÷  ‚yk”gáÚ† ®þ¥½ž €É‚ ]±Þxò¬©ÈÒÈ»”Š?Š žh1,jñУÕ#ÿ²8°9”%?Éõt÷7ŸObåk  Й]’ÀyÚ–j¶ Œa²û5MÂÃ/ݳ¢‘š¸SÊÅv\¿BcÝW ¾b]þÒº\<‹!út“·3)ÐÒM«]Úâ²Òyý™è “ÚÎØŸËqEaÏ"=y6„ãÚýMc%å,>Ùý*\Vïal¶Ç_K‹5–Ô~ïÕâ½ú5•,iØ=öƒt[é©QéG =ƒy½›³MíÉæ~t‰1ø¨´]m6y®Á‘G Z¬ú¯certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt000066400000000000000000000016631274666402600331340ustar00rootroot000000000000000‚¯0‚— 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued New Key CA0 100101083000Z 301231083000Z0t1 0 UUS10U Test Certificates 20111D0BU;Invalid Basic Self-Issued Old With New EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚ãEµ [æ?µý¶â·€`÷ÖY(HšÙFÉRŒzЉ91 IwÉ]ï%§Þ)iÖ~l áªG̓uå%F6p‹*Gvå|åóøVßÁ` ¥3|YÖ×?=àZó“¿ÿùìå3¡v˜  úeoÇù^7\=vŠϘ6»eŸ^ Ë½]ágìû?ØÙFu­Ÿµ@yQ5ES@xA3»þ²ã}Z &ˆfQ0ª®èbyE}"üëgŠ]NhGéËHÒoáOã„5 ”çž–ìG9$«5×"‘²ÔÙØ;dG€‡ImòBk!Y‡Æ%Àˆ£\xì:µíÎ×e=+÷$£Y£k0i0U#0€v|Ød4 Oßq!t ›6¨‚×0U`œÝvÆ ?÷³2’^Wƒò¯u0Uÿð0U 00  `†He00  *†H†÷  ‚<ú7xƒ›Ê¡¼ Uœ¿v¢;t;|$ºž+D„Ìë]g¸8yçî[†ˆ¼´€ÿšv|H=º°O_!ñY›?¡öÇÔ#þ•mÄ躳ÍÐwc70 Ú×ÿ w ­x4Ò <Ã<¿Ú®bõY$Ö„˜9Y¨-ö‰µxÌVkŒº§*˜ ¶"µBƒKöÌB™“ŠÒ³ª4—ý":ìAH/$Çõ Uq§¼× 2¾¬ úfæúPWœOÞWî@vb³sÄ#&“õG ÑÆðPY·+î¡´©|ª¹L'ÁC;~T€·@çô†¶ä¯³Ê5óÊù\’Pm^certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidCASignatureTest2EE.crt000066400000000000000000000016031274666402600303160ustar00rootroot000000000000000‚0‚g 0  *†H†÷  0F1 0 UUS10U Test Certificates 201110U Bad Signed CA0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UInvalid CA Signature Test20‚"0  *†H†÷ ‚0‚ ‚šm£¥þh¸Œ.áïòÔžýš/ÿL‰ØBš?p0æ»2¼ –ÄÙ…øúJKàêããêAÓ;&7ÔßðÕ@¬GÜGÀ«²/¼;U¬<ú#’ѱCðÁ¤qÓô¢ÒH¥´Ó*A“ Ýý_Ûâf‰+-àGZpx/¬ÄáÝ9þÖ‡Ç*Pâ*4P—ƈª?0>˸2UBâ9Òa4:ÀGzp à% qE¤h¶••æ•øö2R ûñ~éßèµê­CÎ K÷%Ô?Vô®Þ²v§¾BµQ-6¦¦Eìð’$?6‚Žð#6ûZý¶êþÒj³íiΧáÝ+NáÔFà’ YzVÊîk ‚~‰ká·ž§•0ÿ3•Ø!:<|¼8ÌÂ]û´à…vt š_ˆ X½áŸC׮ɞ´ð~r¹ÊÔ›Ïá!g.”ªÄ½Ì@'=¸ßnRl —ªü1øÇåE7à‘àD½5^:ö^bæjëÆ´ :˜YÚé¨;Õ­Ëû£ÝØûðÛGî]V›Û_8«· r‡³ýÎÚJŸ´z¾”‘"sdd’ÔQe8áÒƒ ÒwcåÏXk°†|Cw€Fcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidCAnotAfterDateTest5EE.crt000066400000000000000000000016351274666402600307450ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UBad notAfter Date CA0 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid CA notAfter Date EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚Ü'Ð:„ôü:?B=÷7mçrèðó/®$†#e–fûXÿ—ž'ôÓ\äl2X%ìiè —¡×û¯¿° 0õ’‰þš77;‹J¯DGèÙ®HÐzÉ!³TÖP åG¦Q®ë­¤ÀwÖxq?£?VR× [[QNØ6ȃJ©}°E“ ðvuf¹[ôP¾Ã*O} ¡z]Ÿû_¬–ɉ‘²"ý8”aÓ±1±PÙÿ«H^µ©ƒ$D’'Ê ÂiM7=‚g­¯ÝåíüCÁJ¿, ¹˜¤2:1blÉ›áש@sv_êÌuQ.JRWÒ]‚W®^³âÜEpAƒyßvÛK_]@η™Yý_j–óŠ"zjÖ£Ø/&’qÃbnºãr8IçâøÌ93z!=ñ,ó-@tL(ÃM‘ïMa­¼îßOA¦:ò…ŠÑÅõÞÌݥч;ÏÆ6l„—r\w[gav§€Ž{Ôa6ðI„öÑ*å¾É”ž<Œªø¤ë.@î;g'zˆ¿ „ü儃¸ÿ£‘*ª‘¹Â»Öcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidCAnotBeforeDateTest1EE.crt000066400000000000000000000016371274666402600311040ustar00rootroot000000000000000‚›0‚ƒ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UBad notBefore Date CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid CA notBefore Date EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚¼ÛA Àåð™¦ÅR ³±·cq*>J­{%Š…¨Ì¢sŠ+SvŒqDq&ÌV(¢S§4ÂI€Ea'€x›!b*éof#œYö^öeö±´ÒɶR;ñl 'êó`ƒ"*¨8!&Û¬„WS<: Eïàݼ¿=É'1uËwp»ÍƒòœïÄÆqÔ~#ßNÊ+`$Ä>ªÿ§°ìÈhÓGMl_]ˆó›¢žÛÔÙjvwƒ•äçôÝ$ÖŒ¶x±uÙoVä,øX2ÀŽdÆÒ·\×^à«¡L`]ÐPËüû³Ø¶7Uß¶3Rþw‹¾’(¬ õZÛREå¿AZ÷4ÑÉ£k0i0U#0€c>¼žû¡òY¡/K•þæÞV¸†@0U©ø¸{Voqùÿ!ÙÏ=%H%÷¦0Uÿð0U 00  `†He00  *†H†÷  ‚J8–c˜jx±iÁCž5P« ̸_Ϙ£ÀòÑ© öc,ñ¿¼ð«Òh§¤o¢™Ý {)åüc‘Íí§JÃ3Aú²JkÀ`Ç¿Ž5ѾjMÕ\Ð=< ᆯB¯ìü¯‚,ª·`Qœ2Êuc¶ÒvøY®j­*ïPÛ)YvР9_7Ž…Š÷ØÒçó|ÏŽÍÈ0xqËT¯èQ L=æèá®ÎÜéc;Éz–nÅ¡kÛÎzüR›áåâ´¦»c ²¶[qd›­Àm©Åt5öÂÇvk*ðs`jIm7QþÎG^sÞ‹‡ð=Žä‚œ÷1î:¡q¾¤certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNSnameConstraintsTest31EE.crt000066400000000000000000000017251274666402600317550ustar00rootroot000000000000000‚Ñ0‚¹ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS1 CA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid DNS nameConstraints EE Certificate Test310‚"0  *†H†÷ ‚0‚ ‚ų>L\úÓǑþÝ×eS`ïAž±ÊÄ“^O•ã@§Ñy°¬gl«å%y=.¢™§êÚ˜~ µÍt?Ó“¾èOnˆù„þäù è.BÈq kQ,ºKïò¹ÚÕ ±B "ãzSPSÕeýŽ‚tò ‘ú~Œç…($]¹FB3›H^$ƒ©ˆ,©µ Ïý÷é#R®ÍB”ú›g ~žç0 Ì×åõëôjûœÙ¸ésmxOƒ¢^è¶0•Ø$¢"™t¶«î­Oß`òl`UU>Ýœtq&Š ùÑø‹/&-OÈùëšt¶Ê¶”ñ NÞ¥{ 0ª­R=¤ù£›0˜0U#0€±ªðãÏÌÒ§‰¦ƒÝÿnÚãI0UrØw_éìÒu6(xNö*‚?ms0Uÿð0U 00  `†He00-U&0$‚"testserver.invalidcertificates.gov0  *†H†÷  ‚:ºòë:ç…oyü¦ÀP³TÁâ¼Kû<ùMbÂ<…9á’•ŽÈ’Û³\½@em}Í€'×­Þe“¿¦¬°u¶Ø$^rýLþ„…cem5Kõ;Œ¬#±â°'M|=¥Ì_<WFªTë㛸NÁç>fþL¢Â·Ñ£äÔ²ðaÎ7…úÛšq­ìïÃÈY‹rJJXFd6"°×¡¶¡À7µú’o…>¾8< žDÿÄÖ.JÕdXå”îJ}§1-ìø‹ZÊ+á>…£0·ø²*¾VLÖðz´D*ßZot–?H;r_Ht8²EQvs¢³»¶q*ÝfvÂËuñcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNSnameConstraintsTest33EE.crt000066400000000000000000000017121274666402600317530ustar00rootroot000000000000000‚Æ0‚® 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS2 CA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid DNS nameConstraints EE Certificate Test330‚"0  *†H†÷ ‚0‚ ‚Æ[ý”Hýjér˜C'AµbSCM5Íæß Ê’;ÛíÄZç˜-à>–d"l:R'‘@üE6ÄÚÜçífÌ/«|õ3gյƓ5óÓlv†éíCü•¤Æ¥ãõ¨ùm‚°½ð¦ƒØžm|ôwòMÅ_8«oŒ÷â¢&|’¿± +qèàųÀè…:n{ä5¼Ã´0¶„xƒË[ ‚ÜSQZíeûïÕ8æDwE£0Œ0U#0€±ªðãÏÌÒ§‰¦ƒÝÿnÚãI0UÎ@'"¨Ö&;‘þñíPFÎKw0Uÿð0U 00  `†He00!U0‚mytestcertificates.gov0  *†H†÷  ‚EgSÍ{ÎáÇ aMs §Lž¡`ñ|Ùlý µ~_râÅy‡U½s2ñM¦ýܸïQtX\þ¾Ôj3KÆÕ³þ¶ÎDf·È‹‘à"|G„Ö+Ï9„Fœ:ÇÅš8äàjKÎt(Z’ÜZå€àzåzüf”‡äžLÄ»P!©Aß… Æa½Þ #s8gÀˆ‰É¾gùr²@°„cÕl²Ðgɧñ"Íß’K1útNúñ6€Ê›!§×®«*ÕÎ(šÈ{îõï.‡#^k  -ç<[ë°•Vè}–_¦d÷ØÍê«Ò¼@û¸²…m÷ՕЛlÙ;certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt000066400000000000000000000020311274666402600331010ustar00rootroot000000000000000‚0‚ý 0  *†H†÷  0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA30 100101083000Z 301231083000Z01 0 UUS10U Test Certificates 201110U permittedSubtree11D0BU;Invalid DN and RFC822 nameConstraints EE Certificate Test280‚"0  *†H†÷ ‚0‚ ‚¸½ºP‡HÉ«sc‹yñá'Ýá¯D“†Æà~£/ c®Ì¿² ë,üžuÞÿH†þ‘¯>ö#yÏŸÕ#ªñÿP£éj-DHšDaÇœÊZC=Æîè°) §$0`&³Êï é‘ Înn·ƒ²9Ù1Õ#^¡¦Ù¾p1£›iXÉ‚ñ"Á,¹c$ç_øHli7K[œ¼–àÿSâÏiÑ‘juâ2´§ Ÿ©@i_?›Ú·µ[:L²# bLÃíи¹+§µøÍ :È–' Rò‚ð ìÓVWÌ^¡ö^cvI@œ‰ ">/½,ûÿ]À|^]VÁnA›£™0–0U#0€'IäÙEúl˜”lüí Ã$RmUD0U¯ ݪÜzq—)£S§G¦Tb0Uÿð0U 00  `†He00+U$0" Test28EE@invalidcertificates.gov0  *†H†÷  ‚†dæm!ôå‘yôòÔN¼hm㈒¦ø‡r#6&Å\*"…¤Sp(׉æ&L£Q·†*jžeĬ–§ æ¿Õsi¯&éù¿ë5FY 2ßðã U–h2‡Lþ'|X_Ë€*`ÂSqŸ‚ãZæwbŸnê±½í2acýÀ=äùVã¸ý“/nb<u÷Ï…çsd8}w»Èé˜Á ÖœVâ VmÞš³ÀSäU~ôšð¼ügh†®F–ôí¥¨¦÷%òõå§u˜íˆÀ¶YÇðèÝÜ2o[ø´ȇÍQ)B´Ô d«•}ˆ ³«HÏ/Ö‰?„ÑYãE¦˜Ïcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt000066400000000000000000000020331274666402600331040ustar00rootroot000000000000000‚0‚ÿ 0  *†H†÷  0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA30 100101083000Z 301231083000Z0Á1 0 UUS10U Test Certificates 201110U permittedSubtree11D0BU;Invalid DN and RFC822 nameConstraints EE Certificate Test291/0- *†H†÷   Test29EE@invalidcertificates.gov0‚"0  *†H†÷ ‚0‚ ‚žÏPÝ›ƒ¬‹ pXLeE„Åî1oK¡ÖŒ‹yÊàNªÌãyæé„I L\|B>áø6ˆ…í¤-9z€?Ý!ê>ê)×Å™;Ô\R :°Jé5-ÔÊ„ôò×y—jËî.d8!8›M=Æ¡œW¤àî<"yXèlM—½Ø ììs X»4™W«–µ£/°ä¸KŽìÄüÞ¡¥k&¦-x©š(µ‹áf+ý.ë4|ýÙÁÅÌãvиRé?Úú]Ì ö[^kº+›ãü°Æ)ãևl€¹’ÒÖÏÆã.=—쮑°ì,>~tèqCÓ¿\š²~:c8@×£k0i0U#0€'IäÙEúl˜”lüí Ã$RmUD0U*ª(F¤Šz7¤¦DŸÜ`è#]ð˜0Uÿð0U 00  `†He00  *†H†÷  ‚ œÃ–g›f#ÎHOúc®vÖ’—±¤# W­Ää<à'‡Ü°Ê1Z¤oü4AÝØ}t´iÄÕOÇž Ècbè ø¢µ |Æk-§oƒ¥Ø]<€Á_]½œªéjçkDN蜧Bgçxdd€8.Ï£0v#@,qƒ™§ç¸ýŽbhîø}§å”pæx÷X¾~… †ÓhêæMæ·^"]{Â}Z!×%Ìä(2ïÒAEîÁùT 6Ã{nui¯ÔÓ¶m ùû€aÂo±wkOCß¡£•y‡z$MíŽsG¾ý»¸Ÿ«lPŠ'¸è*”2ϪTÇz€ ¡ûøÞcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest10EE.crt000066400000000000000000000017321274666402600316250ustar00rootroot000000000000000‚Ö0‚¾ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN5 CA0 100101083000Z 301231083000Z0 1 0 UUS10U Test Certificates 201110U permittedSubtree110U excludedSubtree11907U0Invalid DN nameConstraints EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚Ë\8‘?Fv•‚Ã}›G•HL×åÀa¾7eTi7y"«Ô.Ie‰Ô²•WIÿ>í;\LÝ£°—üš”ì0T`í³;SÓvÒ¤À®Iœ6ÞžÕˆL\Õ”ë@ÿÚz¥‘ª<\Ÿ,(‡·ÌŸ‰=LÊ%#¨²Ýå¼áž×•\¥$µŽfJ Ê.6×ý[yy ®„xÉ{Á4.‡ðiu]Ž;ŠÿSåÎxxSMËF«/¦ù1æ×ÿxþðÛÕæÄ=ü\\és–{"ämRróè¶ÖÍ"õò©æíÅdNyyª•Z±¥¸Wõ@Íq|Èë>} l|æk­FVH=ùnRI£k0i0U#0€ºŸ Ê9œNwZëû•¬Ó§J]'0Uø|÷ x2S‚×å˜߇ªûóeÒÐ0Uÿð0U 00  `†He00  *†H†÷  ‚ª¡sâ5 1–žÆõ‚¹‰³ñò×ÛßVßH[¨Ò%¨(‘Uçŧ©™˜ÜI]`Ýå)¦`—°¼ÌÝï ÀsÅLJ™ô%þÒ€)×–7„ãu¨F@×UP&‘–‰êCÌCÎE„‹˜Koâ×gvøš8?mXÆà•ÄH§ (øšU=Œ)ÜóN¯›g°‰Q¶CIu@F­^ÈЮ$>¤a{ž€ì€^ô¶ð¿¶Ô˜#+!Á¿Û6ÁìR® ¾ÍÛs[¼±4&&þ_1ޑͬÚË,Ûª˜í™dÌÂêß< ¢³ÑV¿ÃyÅù¡WÔ®f€y ïœcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest12EE.crt000066400000000000000000000017371274666402600316340ustar00rootroot000000000000000‚Û0‚à0  *†H†÷  0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA10 100101083000Z 301231083000Z0…1 0 UUS10U Test Certificates 201110U permittedSubtree11907U0Invalid DN nameConstraints EE Certificate Test120‚"0  *†H†÷ ‚0‚ ‚±¦7böPÒÜ0I¼ .Á3§“èØÎ.ŒÉûQûØtÑËj_¡ 0Þ<­öþDkZœ®ÀÛÍ ­WbI LyŽkwÿó$¸’Í¥rQ‰Í€g2¹ÌUäú1Î2N vòÉô8î­ ^6<_g9õü‡xÅÁágòbA³LQïd¸‚|EK}W(ñÕZ9Y¹r0öÔ[ ~oÌXïEØÔ)5¿ƒ§›LjËÓ’9ªÚ5”>˜´UPÓ6§ð¡Ý *9´¿Î‚>h1?y¸¦íNŒ½lÙSSY‘µ˜ÖxÓêKeeòŠx62Ug„Ž¡Káv~MEש‡) sØDÉœÈý£k0i0U#0€á8C\ÎçKbÇÁ’öf‚ê0U… „ä²® K ÅA´‘½žþ90Uÿð0U 00  `†He00  *†H†÷  ‚}ˆšw¦v9[" ø<© ËS…°>?ôu¬ø4žò]ìÜhOÉøÆ¯å¢ ©éŠ5>·zñl;ݧëM]2 ’?È&µž–ÏIÇôáažy<ŸÎ“š Øñ8"†áÜ$äã­ç•ÚgìÁ¾b9Û¼doö å6aã!è;D&åՅά˜ýEWÀöa Øô1D“Jé&ÇÑL(:~ú¾>ø†ƒêà¸`Ç·™Psøv"‚Ôãž·‡B¡{ ",¿Ò|±æTTÔ´–8%Kcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest15EE.crt000066400000000000000000000017021274666402600316270ustar00rootroot000000000000000‚¾0‚¦ 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints DN3 subCA10 100101083000Z 301231083000Z0„1 0 UUS10U Test Certificates 201110U excludedSubtree11907U0Invalid DN nameConstraints EE Certificate Test150‚"0  *†H†÷ ‚0‚ ‚®ár; R$õû‚¡‘sº])èáYᦵ´b uTf^+¬n°CJÑå;†Ã·òŸ®ú”\›æô=h&3×Ú±:/­2.Z—þ_a=­J/ïxò)¾Q ²å¤Ç(î»–ÿ¶Î:ZF*¡„Á B@³êar¹ý™<‚pºõI_)çþ¿Ñ`ÙdpE¦ûtbë{´ɾ¬Ì>˜Úó‚V«˜Â¼ÎıٖexQ¾€ë©KZ§æ¨¶gá¦Î» О‚øÁ¢ δ×Ú £;™ëeSïÈ |%„ÙºÒÕ,fKÉo'Ämݬ¤èê¼wo^km9ÌYj±£k0i0U#0€€¼Ç.÷Žñ8{ô5ëÝéXÆq:”ªqæ¢TZ”ôRFÊnÚ¿x#Y[DX‹[!{›Ú1”»q¨Ö:[Og¡˜ h¼·]ƒ—è!Êú`ƇæíÁ`vó0eæpñ certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest16EE.crt000066400000000000000000000017021274666402600316300ustar00rootroot000000000000000‚¾0‚¦ 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints DN3 subCA10 100101083000Z 301231083000Z0„1 0 UUS10U Test Certificates 201110U excludedSubtree21907U0Invalid DN nameConstraints EE Certificate Test160‚"0  *†H†÷ ‚0‚ ‚Ö`ðì^~¶r¶—ô;(Ñ­LÏÊ ›Þ^Y¸p{©pô*Öý9Smæ“»>è¬Fï4¨ä¶Gß”fHÚ]<ÙMj¥sf01`ð-9­KHrÉ?‹° ÑÌ&°ÞjîåŠÙ:¸S?¥DìYTsôCf„pN™‹¶0 ÿ¤Í)^Ûë²ÛZ OtËKµÞôÒõšþ÷}‰Ç¶"I̵Z> "¿íyV‰gÐM¿]-Ÿ Ú â‰Cî_gJ4Š$2j~ê¾yÉë×ÅlTií£dÅÉðû…-ÍL`Á„!D¯-m[þÅΔô°(ß±ù Xhëu­"ߣk0i0U#0€€¼Ç.÷Žñ8{ô5ëÝéXÆåLl[‡ý<öõ#e_Ej0Uÿð0U 00  `†He00  *†H†÷  ‚8ëâΕzD&qU]täóÈ@ÕÇ ÙjQ šO°–ÌÌn,(û7¨ÃD¹\T[ðeÚg=q{þ„±#0ÈïáÍ!œ&`DwUo•¦ØÐ‚< ¹¾®W¹ 4±fÖD…á· Ùü€}/ ºù¨Â£¼çJ Eüm/°I¨øZRN΢GžçØi"Ž:¨iýÿ6üc¬^¥£à qªzñhÇ$b,ñ'©,ñ-»!K’ŠfÌü=nƒ8I¤×»ßx)N0ÇòßôAEÙJšz¨bþ\äelâHwü!Ž’ŽêL· C-ÀDtPƒ¬þò¨fµ<’&¸š˜ËÿyÈ ±ÏÎcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest20EE.crt000066400000000000000000000016101274666402600316210ustar00rootroot000000000000000‚„0‚l  0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0‚"0  *†H†÷ ‚0‚ ‚ÔLo©†ôdÆ›ý*Ï pÚ­vI×›˜:W®òwÌröù2"Ï"e°` â=$¦…¦ÈrðôÞùqm(¾¸PE’ÙÔÇðJ¡. (!ðAÉfZ‰L_êHï;¿„Öy<,ö&°r×"[apšcø†Ù”õÒÖEÊI÷îQbx­™øŽK;¨siPêYÃŒüCÅßí‹-)h€È&ܔƓ6m?ß œ6C¦w2bÈ·ó5¬s!»Ï¼òéǘÉeœQ²˜RÈù±eo´y÷¸:IépÛ²&ÝŒj€G·Îþ.)5}‘f™¸˜Pø+ÞÉuïIh·2 ü9Æç£k0i0U#0€AxBFÍN¨‚çá9ß÷©À üï†0UXJºà€òÈC<–²÷J²•ÖÂ30Uÿð0U 00  `†He00  *†H†÷  ‚Jõå£f3.'JnU’Gű×%sC@Ÿ\“bD€ºE‹•ŠUШ~%_Wÿ –7}Ð~ÕQœ2zŸiÂÎÈœ‡,qY¿æÆlDiL;Þ_ €ÜlÚã"œï„l!mgR¬òS"ë%F¢©Ygþo`´ 휲zÿÙR¸wòæ´å$€*v޲£ùÒÐù¸Öz.8zï¦hsåê{É›8õ×ç¿üRê27±íDÒÔZZêÑÓí=¨:[4•Uú¼N­ºq0‡“jÃæ‡,W5pòzž èû[x÷~‡ Tè~©èÒޥʜdš–„d^í‚#3€Êµ‹-Å certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest2EE.crt000066400000000000000000000016751274666402600315540ustar00rootroot000000000000000‚¹0‚¡ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0ƒ1 0 UUS10U Test Certificates 201110U excludedSubtree11806U/Invalid DN nameConstraints EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚Ä„qí!’›K$Ù!QS[:G‹Y‚m-iû&uCƒ ì×¶}F°@W¥+èkúC3@“oê 2LÙ|û`:0ç„~ÙÛÞ¸1¦O:_&\Xá£:Ýpg…¨¥vâ<ž2b¥ðŽ×ÒêŒç>P¡´e*NÓÚssÌ\…ãÇÚ wžíµ¶Œ‰=#—úí>zËÔºxE(áû8V{’ot® DÀÖSÈ$à5YªDÿG—€í•ÜçÛ’Õ0Õ"l›e¯ c¿B–òt.zšûOž…/:™‡ä»Iá8ë²ò憣K©6$L<ãµ\În0)jcreêÑð‘îì‡vê{£k0i0U#0€AxBFÍN¨‚çá9ß÷©À üï†0Uüsÿ¤âZ÷&˲B;ö µ§ÙÕ0Uÿð0U 00  `†He00  *†H†÷  ‚VêXñm\Zk®xBQA¬µšÝ°Üðµ–væFÖœäp†ìæ²gB\)Ë‹=HÖ§~¦ìn"¹„¦wfsS´pD2ª÷‡GÛßH<]ßôzSlWÚ×AÕ49¥*¸ØÈо ZÒ«÷ª}ÖÚ' YlÓ}m÷oº¿Ÿ,w`ÅÄ´AûùP7'Õf½lhQõçs=/LÇBxÓŒW@s—¶H¹Zov[_2L¬—h¹ LJƜ³5e¾zZ½ÙŒjqg˜[‰‰ávD½E\ 6Õ_ øAõ6nT¥C-oÈüü¸˜^W&§áçÊ>µÁ¬æ\íuéQë+È2Ê~¨À~•6²8êw¥È#CK-EcÈÆÁ¹#ÞhN®]>tîJùCtPÞ@ö÷ ’lñ¶d£U"Ë•!·wªZ² È©ÓKÃxsQ¤ò:J¶[²=è‚iѬm»H¨Ü¥XY‹â‹ÌéëÁU6ÿ£‚0‚0U#0€AxBFÍN¨‚çá9ß÷©À üï†0U8©ÊâxK“ûR‚.TÝÙ®AÊ1´0Uÿð0U 00  `†He00”UŒ0‰¤†0ƒ1 0 UUS10U Test Certificates 201110U excludedSubtree11806U/Invalid DN nameConstraints EE Certificate Test30  *†H†÷  ‚¾2ùÊ­}h¢“ÒCáLÜÍýKüC8Žn1 hÑŸÊ2ÏÄ4¤ùIZŠxá®4â-¢ù4¤ÚA~³«ò1®eµ¢UAR­Gîú”‘× Ï•©®´ÙA䯞eT=õò±AÿÍn^D„SmNVæÈYz=zyUîÅo˜+ ©¨jO›Îátx߯Nºu£¹tߢÇIЋj³X9)¸¡J›f„BÅŽp¶•œƒé옾—ym*R1þ>¤3©Ó§¯_Ëf‡Ò¡–qãË´DÜæd• l]:†¸n¾ `“?|ðˆ}UíÒŽ"·l•ñÙJ8b –qk冋ÿÔyt¯}certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest7EE.crt000066400000000000000000000016751274666402600315610ustar00rootroot000000000000000‚¹0‚¡ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN3 CA0 100101083000Z 301231083000Z0ƒ1 0 UUS10U Test Certificates 201110U excludedSubtree11806U/Invalid DN nameConstraints EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚žƒD8Ræ|ÿ˜lS³CÖhˆúl¸õ^¥IÀ× °™Q4ÑN”J†Œ¼v³µŠA þ×7^ÓÐç±ÿÖæÓe%i# äÒ…æbÆ®Þ8êû,Ø29}Âü!‹/Dê( â+½ö œXcÈö5´0bGÎñeùÝÏ[ö ™d¯Ä,ǺýšO&?5ÐB–9dÙ*¹MvÅ®ŒœÂv%ÔíË#É"@ÔQÇ#yü Oþ~/Ë2sÝï«¥¢ß¯òår”x•ou„\âÂ/¦2†kŸ×h‰KÛ‚u”°©J„<åôeRSô0îò-‹‡)«\$šœ¾Àâ4V¬U£k0i0U#0€Ü[¾Ç7Y¤Š@t| E¸í"Õh7]ñé5ó-±0Çùsí¨ÐcºäÚ^âX$±?gQZïÂh¦.b¬KbÑÿmGǺ$­§…ODg%1«¯¿nôÉò78ÈP,šë¹*Ã3Dë„=lú´ø×’- ½†HŒs„æÙÁ@ŽŠ&œ"Ñ×£k0i0U#0€lI6­.X‰6QA;TR&$ÓÊu0UˬÍywÓêê箋 È5¯?rd<0Uÿð0U 00  `†He00  *†H†÷  ‚&¼³’ÝuÅ}‡F:ª v¯`gRÀºÊðó²[”ìÒ¬u¯wp¿òLr6®v¢PM>ì:+–áDoo†ü- AÀ‡–Feÿ¤Ö}·¦q„߃âüqÚK´œSMO‚ÖN½îµÂBðXYc⺈|{ùío¼gîPX¦+!ú•mˆkŸK ÄÓc”þëýß3â‡6°~ða_S…D|Üú̘ﷷDÊú¼".q&UrW©T×…JGÖêqÌËŒo.›EWáœÿ”lcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDNnameConstraintsTest9EE.crt000066400000000000000000000016751274666402600315630ustar00rootroot000000000000000‚¹0‚¡ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN4 CA0 100101083000Z 301231083000Z0ƒ1 0 UUS10U Test Certificates 201110U excludedSubtree21806U/Invalid DN nameConstraints EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚²>bÏÓ¿Ž€ó¥gy²$·ª¹‘ÜðÂ)å&QƼuP®‰ŸWÂ~7Πçƒo •óB Ëò‰j¶ t\2îDâc<·¨Üþ„ïu~ ŒÉ/b†Á)ĬFèn2@§Þü¸íî4{Éñ†ea;÷ôr±,™a„àFª¦zÜ=Ø=Kioö—ˆéôNœ .›¬øÖ1‚0¼È(8yÊ`cذRûñž÷ˆ¤8 åoø îW1é'ý.ü?ÃZ$ £c÷›éáþZü^™ú¥;ˆÕ¦}Ý(œé—ÛwXÊ4É…͉kRXâL]fè_níëe™ØPîA~Å£k0i0U#0€lI6­.X‰6QA;TR&$ÓÊu0UP¤16Ž×ÁÐÍ©àl«xν¬ï0Uÿð0U 00  `†He00  *†H†÷  ‚¨›”¦?ʬA)AÌ3IÎ2Æ >Õ_?“üTó_8í¸£…³I“PP©òstÆ –õÇ‘ü¾æKÂõò›<°º®ï7æà6±{hÆç伄G©J‹f9 ìjAã÷Á^•ž¶nÅã8BG˜='í¾UÅ7?A ¬"±\»›̵딾ïò!-~›ñ™?Ò,E6^Ã×5~aÎ\Ù ã7x Õš Üá#^öÁvíUOGù†ÔØ]/(å¿göýXûÊêq¤Æ”êé5àïœn®Ž+jò¨V»¤ðÏ11Ù›€Uš“&0 X.‡ÁöTŠ€ã„qYcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidDSASignatureTest6EE.crt000066400000000000000000000015231274666402600304470ustar00rootroot000000000000000‚O0‚ 0 *†HÎ80?1 0 UUS10U Test Certificates 201110 UDSA CA0 100101083000Z 301231083000Z0c1 0 UUS10U Test Certificates 20111301U*Invalid DSA Signature EE Certificate Test60‚¶0‚+*†HÎ80‚½°z<´I}æÉ‘Íc*ÏEhey%©e¹P˯j²ýÁsÞ™¬eÎ'óî> 1êØ¿{¶(ÿeFåÍ¥)ø/Á€uppA'6[:¡{K²¡VýªðÎBå6ï4Tw)š®cªI÷>®áÂùö‰2ÿ™h{ùÎ4]ñ|)d{4d­—c BÊŸ¸ ~:å3¤.[À`_mCF<‚ð~ŠÂF½:@ë§n-Õ„fxí0¬®M×hñ ønöó:¥•Ù)¼‘A¶n•õ¡;ò¦‘$Ttƒf NþKâ€"õÚ’¹ÉÍÜŠøû}©¬•øÉÌn"X±µ9,÷ljÂS÷hñŒ¸!ÌI“7ä/ó·XMJ„€Y¹¤Áú0þõMÞ&SçžZ—6ô‡RG6ÒÃ53êÔΣ´Àý_qÝAÏoú̡ɑD®9ϵ<ëäß埓)RY†{´‡¾<ó)Oè1õÄyH‹q×Ý’|6]»°²‹çru¥©Äûø!÷/±u\òP„MÐÇìµààÎ\ø–£k0i0U#0€ÆŒtè{ ÈYÇ}<[TY`% ±0U†hú*IkIðE^¿b¥RÝ… `E0U 00  `†He00UÿÀ0 *†HÎ8>0-?¤ä똼s†Éu»±›?Së^vˆêö«}T ȨêÁsŸ˜¢certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidEESignatureTest3EE.crt000066400000000000000000000015751274666402600303350ustar00rootroot000000000000000‚y0‚a 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UInvalid EE Signature Test30‚"0  *†H†÷ ‚0‚ ‚½!+792±X9¸nå‹»kŸ2 ÜÚù‚ß:µÕÖËÔÆÚf„â­ŠgÅå˜w¹Ú“ð\±³cÆÑâ‡+ºtýOÁ(Ž*¸Úcƒpýžu°ëmA³n|{ãrPþ®>*ÄXéPøC4î!”/{Çà7=L­ŽÔ|öæ#±ÂÝh/žÁO?B©‡U"gQˆ5¿éX…¡Æ¨.×êŒZï ¾}}øB×ßæ^1ûënÂ.LoŠO0Š®¸Ð.p ”†n^lÚ~à¦Ñ¤¼5ͦÎ@¯fãîÒjè”/Í´ÄEÔ1¹Xk53QC“áIê,ï|áÿOg†¶£s£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0UÁƒÏ’A>ŸðRøáìnSÎd»â¼B0Uÿð0U 00  `†He00  *†H†÷  ‚³ðeÁÁ­(ò<…ýæÅt-uÂÿÓ€-ìñ·TŽi┪sw­ëOÎz÷þ¯V_žj“V{Û¸’ËÚ× cáã[ºÔè{üïž)T3í¦‘ô ÚüšxÉò%™Ð}èG°+W»ËlÌ+ ú@0ÎO‰Tž+Uµ· ‚&=âÆ‚áöwÃÛ´Kö ›Þx÷‘%¾Mº7qWwdLÉ਑°te&]÷mh¶ƒIöŸ“ý– i–Ò…^ñ‡h¢ë¹ˆ|¢G‹?1Xx(»8Ø¿F¦LtjjÝ5ËѹïÃERwÝ®Q¢‡‘ɤ» N¾Nà÷š<•k”Qâí;certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidEEnotAfterDateTest6EE.crt000066400000000000000000000016201274666402600307460ustar00rootroot000000000000000‚Œ0‚t 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 110101083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid EE notAfter Date EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚Õ…Âq:ˆ J:¢Z#ú»üÀV»Ë,Ó"å.g ×iË–Àdz²šÏvëy6táƒI¾·¤¢B‘j%Ê)Xv‹ìüü5}ckÔ~’„ Îïî¥í¨æ”‰{—S¢|‚رË= FÄ+ËêÏïç1È€ö+ykŸÌíU"—#¨ÚœЬܱaíŒ\UY³ÙØ¥iÛ!%YBqQÕý­IÎaPx¥JˆU@VëýAž@ÏRVªÏ¯t ÃUu–Ø_ù![&$÷=U|T,jÛvÍËŒ3‘•x2X³yH›ºÈ£OÝìûË…UAi¬@£2/·Æk9â6Å@<ÎK£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0U%èËwµÕ¶¯#_V#º¯­¤¡0Uÿð0U 00  `†He00  *†H†÷  ‚T_'éЧEUÓ}Uñ°=‚x3BÚÄ#N@kE[;÷oµJx‡ ÂÅ xØî%žaSJo>Ç åí»áñXo²Ù6 7ï㡚ìö®äþpj ù6ZY•¢ó)÷lÛøb9¿"ÅœGMc|äNÑq ¶,C:Ôc ÍÄEæ’†åÏæ~»³Z-n(`Œ­?q3ƒD|t$c ËïyO*êÖ€Â|HC¡jÁÿ8¡uVóZœ!ÿ Þ/™ÎÓ Ù­ìÀ@ØÔ,žJxýXø’Ý|B‹¿`ý¡©Rq“EÀ_«&ÒP싻ɛbP@ƒAïD‡(¬¯sˆ]ͺp9certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidEEnotBeforeDateTest2EE.crt000066400000000000000000000016211274666402600311040ustar00rootroot000000000000000‚0‚u 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 470101120100Z 490101120100Z0g1 0 UUS10U Test Certificates 20111705U.Invalid EE notBefore Date EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚µÍ´`ŸãÚ´”b'Úê³JÁ Ãùý¥ ÿrW©èÀË _‘)j*[oq¥¬xÕßÊèªÿSˆ¹m|ΠÚë7ÍJøV=ÿÿºN3?—ÁL*íRüùJéd ¥´ÚT‹ÈxçÓ¦õ«ö¥µ7Òuh}äVÁlw:Æsºãl;Ûݼöo)¤ ¡–Ø Wœh&"N‚á.`ÈjàmÔ4p AÀ×KÙbÿñÎÞùXÊ$X¿!g“·fåÄ6×ßæ¿9kÞ¬½“G®,Oû¸ g$ÿÙ!Þ¬lÃØJDrv½q9}ÇŒ aI{žý8:eÿßt¯.—£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0U™t§=Bl/n1x•\tÕá\Áör0Uÿð0U 00  `†He00  *†H†÷  ‚=+³¥IA:òTógjfŠ9p/>™/ƒvNm6‰Ó¸ìÇr¥#@ÂYiJÿ‚ÉëÑÐËi.‰O4Ûò[.⌱“Ê †µNÖª=­ô æ]Aùkaö‚›ÊϨע´ÐÌ9ÙÕË3=غ†Ôªñƒk­,4²Òë¤Ë6uìK«¦ì·Ú¤pxÚõ)t ágDak8S3º07Ì(Œ%f-‚Õzh+}·úµ’ÝM)ð,Åv˜óúóâšàSpyxSù²µ<ÇÉÈ ÷OÐcz.TÇÆì}QÐc/à e&>”ûüô4‹7 ÚÖd<0“.î~ªcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidIDPwithindirectCRLTest23EE.crt000066400000000000000000000016351274666402600316340ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA10 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Invalid IDP with indirectCRL EE Certificate Test230‚"0  *†H†÷ ‚0‚ ‚¶nÜh}e¤Ð²nÐæ:ôõÖi D4ñÇIíè·B‡M¾Ä7Ô\áŠeô¦ Z]Jc]KËѪ™Ö@“Ÿv•…Ñ.¤J[¦Y HÇd€ÜŬsUÖåŽö°ÒnŸ…4<È¿øKÞì¶7É‚<%÷±´±w €Ãy3QÜÑåzuý#Ú²†jBøÂYò„'ëîÌý3[¢QèüÉveù\ÎÛqÄŽ•¶® ºÇè«g·ÿ½a9tÜoíkD·JÇÿQYlÔ½SXR&Wß÷¯}Û™?-œZ´‹ßfdŸõÜKmc‘û•;`8—Ï©‘ê§`+îD(šè#ç¯Ö¡ú÷mQ\à3²-0Ï£k0i0U#0€%ø¯ü¯¶©yKÛËd,‹K±Í0ULFe`ôbù#Nˆ#d´–¢{øCU0Uÿð0U 00  `†He00  *†H†÷  ‚ue»ƒâ|ÊA©xPqÄöœrGü÷¹ÕrN a¤v{.iExË sÇ â²4—+.w’½¾z™ºYÂè„ÂÁ"ƬªÇíR½ËPLJÂÛz•Û4j´»L‡8¥KIƒô\ÜR×+½ë²ï^ƒ¥€^Q¢1:Ù¦‹| ‹Òüø3rR!LÄÏ2˜£«Ü¯€šFÔ÷³ï}Wûz«í©Ä$9OôºÏOo—P³¢ƒ•&·È9Žòâ_Uë\©ũ˜RLV"qUkRÂw«16©™Cñ7ûLÜÂö÷1ö7 n¹„ºç†éëìIIÉ¿“A?"r§P³Â›”K@ïcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidIDPwithindirectCRLTest26EE.crt000066400000000000000000000017731274666402600316420ustar00rootroot000000000000000‚÷0‚ß 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA20 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Invalid IDP with indirectCRL EE Certificate Test260‚"0  *†H†÷ ‚0‚ ‚Ìš{2oC*[‡´ß‰Õ’f•k1Ð1„ŒÜ€{aì!âîÃ{?A“ŒI'ЭtÇ._,ÖÅSÓø~Åi@8!ÙNŸííуbß:ö¢g×ácá üxDíȦ®r±ôYçM©1¿¥Î*wû}|ö›Îd1£cÚ0{¿Û$½4{/>ÓTý}§÷Çô˜ú#ð~<“4»öhP©ŠÌ–z3mš ø„‡Î+·¯zzŠÏîH^TØy{6ü Ê !#~îÀ}1Ë Šêú,CÓÖØéõCÀX$ÆJ¤ì³ ê`»úÖgô/Ù¡Î;T0µ—«£È0Å0U#0€ˆ#á³³òlþ1©¾‹aª;’‡¤£0U›½Â)¨¯Æ µYƒtà¨2¸,0Uÿð0U 00  `†He00ZUS0Q0O¢M¤K0I1 0 UUS10U Test Certificates 201110UindirectCRL CA1x0  *†H†÷  ‚þ¸Ê·‡jÙÞÌÁåe¸5ô²žØ´G¦øò^]t ñ¡ù}WŠ3ðUõvBoù„<:z¡·úìÔšÀA ë/ŽÙp Œ›G[=‡< [pÎÚˆ+YÖ!¥¼ƒrlÂm7ë­©_ë'ZÚœð|óWмÀ2Ý…øsŒð¿5+8ƒ µ1v;0EécåS8pþÎ œKBÑ’E€¼g·XÑÎ/Oâbo]½•E®Ñ~xÚ «‰¨o2þjX‘]Úzµdf6JÙ¾‰ª£(/moÏo.·¯»´OôìÈSßÇx›VËŽ—_k=°>¶UFsw>P(¹T—m¾certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidLongSerialNumberTest18EE.crt000066400000000000000000000016641274666402600314570ustar00rootroot000000000000000‚°0‚˜  0  *†H†÷  0N1 0 UUS10U Test Certificates 201110ULong Serial Number CA0 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Invalid Long Serial Number EE Certificate Test180‚"0  *†H†÷ ‚0‚ ‚Æ3 ELÒ€ª.!®€ÞµDh·/\3Þ¡Êó+м[ñwð9CÚóødð`5Ë I»>_›Ý«y“”g¡¤±EZ)—„ÅcA›b =Á¼Äj!„ç·˜ zœå}Ø»£užÊ@µqG‹´¥[È '<5žÊÙÿPwQJñüùÛ5*‘¦Æƒ`Ê­+¡vM§\ö #ëvAí×0M™GmQo)à½y!è"5#XµF‰?x)QíœI®^hû¦É^†sîó΋BÍTUBèéݹ®êU¹ôFcaN³ÈzÓvc‚ÍcvÎ8w×½êc6åº*ÞMÐð‹K‹ál">«ó¢£k0i0U#0€ c·G®Â2oã:¸ê ÿ×d¤0U¢ T~÷pµ†ºmVu<¶ÿX‰„t0Uÿð0U 00  `†He00  *†H†÷  ‚Yµ›ÿæÍŠ›m cvJ¥Va÷Ùü„È¢;ªp‰Ó?©l«ëSçà$›n«=÷Ö'¸’1ʯ›é2”œ3 `",ô¥¨Jký ×™;ßñ³ÌÓ6%‚„]U–%™s 'åÁ„†wC øK6 ©ÚWilòŽ}¼Ƕ͘žT†Ð¼Hêϰ|ýH™æ€õ>fÜ1Ž&ñž°š8Ìu0ÙÏl Õ«Æ¢}î ˜Ÿ Ã…Òž FÈKýGâ¿A^¤ç[`‘üž[¯Y„Ð<¿î °|yC¥µªAIqí¿:ÔY°îªC9Ã+í²ïyi0ªÙøSñKñ£`(xaâ±Au:Æcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidMappingFromanyPolicyTest7EE.crt000066400000000000000000000016501274666402600322670ustar00rootroot000000000000000‚¤0‚Œ 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UMapping From anyPolicy CA0 100101083000Z 301231083000Z0l1 0 UUS10U Test Certificates 20111<0:U3Invalid Mapping From anyPolicy EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚Åõîj£ZµUHøçÅAmâ„«—pær°’sõ&ç8Šq¹þ,)s]`Å)Î{$D¢ndÔ47å¿Ê|‡ßY[(õY¼“þs † ÈV®½ÕÝÎ߈‰モÀÌ¡‘¦ Þ® ’ÚH_—ç™-½=p`Eˆ@«ðŽGg ²ò‹ð¦NºÚ bҜʹ§a÷X‡ J«íßÕ§¼žQ+–’ðb'Ð.ÄóG=ê< ã=;â®Ñµ/(‹û¹Œ1ý6˜Øê§]<¯‹¤+Ú”“aYÁ~Óù4^vmac#FŒY¨æ_³FAˆðº#ŸKôíC&Œ¹¥£k0i0U#0€hsà 4Ïr@Ú”–Ö«z¤o.Œ0U1‹ˆ“nwÎì»äG,«•¥,úÒ³u0Uÿð0U 00  `†He00  *†H†÷  ‚;ßD}`=©ìP¦dˈMæm‘B&Ë";µ0ÑúƤÑ>Á’®?YN¬ÙnNçîýapºKÄ6CBvYÔ y$ØË3 ¢rü},Œ©]q^fÜTî‚QÍÙ•4üS™ÉÏ€· ›«U‘歹Ø8a%˜W€¸{.mY—¬xk2yxé çuÈÏZ­¯ôOéF˯N“Óîúü©°®¿¤çÇ^Fù¯Ë§S}¥½*H¸¢±“(ÄpÞ€ÖÏ`èE‘úMW6T¹zab€2Ò‰d0 ÔZjÀxÌÿŒÿY«€f«Å,i…2ççáèåwDTC“ps_Å®+—15!ˆecertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidMappingToanyPolicyTest8EE.crt000066400000000000000000000016361274666402600317530ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UMapping To anyPolicy CA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid Mapping To anyPolicy EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚ÊõÕêÏÃËÍç¿}ÚÑ5¬U¼Þ|ÆÖAçés I™‡I$;öQy8…¢ÝW‹âº>N˜fÜI.\¼VeP¤áò0¦´1M‰›.ha]áÚƒšÀT®€›†%9°ֿsW¦©>jy ˰ÞÅWG0¬Z’銔ìÁÚA(FQoOÁr¿ ÛÙ&1±uUÍÆ=kèR¯*ÂX® ” ÏÙÓ¸m9ëÓÕÃgvfÇéÅn)Zp±†{ï)'€ÿU}4uxr ôkÂ: æ5äq×òÉ=sŵRë ÃéA‡|$ª4„•ªÑ ©ìd$]=›H“2=o…¶¬ðB<5£e0c0U#0€,í“ñp”‹-“´˜Ò·¬0U¢ä|Á:1QòJrn±ƒà^’KÚà¨0Uÿð0U  00U 0  *†H†÷  ‚M£'ãA‰wû~ >Ö0ZÔÕŒN/Å’»{‡~I‰Å¯¡†±ù’ïm”ì\ž«1›mšªí8‰]ön¯ç´ôP[ƒÃn…3zý°õÊEøèn~§{(¢‚—Þ{𓦵öÌÆƒqÔ. & +æz‹,lnWó_P¡öF{ÔÙÕ5LŽZ(¹¼Ó´GŽFµg.¢!ñ w¢TÚÕÖÖß›gšïëòUÞÚ+à—Cø’ %i_ê ‘¡Û­Î-q¬ž%ÊÔ ÝgùŽQ.¾ZQ¸¦±YýÈ ú^Ñ^óÛ‚¸ ½x8œ6×EЬß× ¶«&OH%áÿŸjã¯Í†}certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidMissingCRLTest1EE.crt000066400000000000000000000016151274666402600301250ustar00rootroot000000000000000‚‰0‚q 0  *†H†÷  0B1 0 UUS10U Test Certificates 201110U No CRL CA0 100101083000Z 301231083000Z0a1 0 UUS10U Test Certificates 2011110/U(Invalid Missing CRL EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚° žäГgãö6 ¶…{3‡®2‰ƒ¿°çmézàùy×’«{û+ &`¯ÿø–© ²èåa•dë‚–›Ò¶d„ëûz J˜Ñ"¼9:FÜûªrT„—*¹ö±e±èÐêÿ`ã7"N¦úÃöne\æ3*Ê[ÅÙ‡ÝÙVJr’xÛv®ŽžMÏ›2Úƒû¾©ôˆƒœF¥úß“ Sûô›˜äÆÛ FÒæûŸ[Itž!>}ëB¾«IZóû´U»æ“É Ÿº›ªO½vÛ WÔJOŠÏª­¬ñ¡\ìD9bX]žS¥ecÏ8À7m#–ºFVp³¡É£k0i0U#0€n®EÓùýÌ®ziý¸ÒLì0U€¤ÜÑ13çx)$Í™Ú0<U5Invalid Missing basicConstraints EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚ÏD;Uçü£õ/‰Ÿs'6BÌþ$5ņWijٕR¯”¸E»:E¿#á5wgß"Uƒªô¦onþG£*ËL\ZÉ0›½ƒ®nU[¤DCׯ" ñ%]±ÿŠ`î¡ÄÖ)=r(+… ÖUVäbyÓJDG¼Õ0Å2iúœä3ºøË¯ÇsöÒ5±Bã?ºr“»Ã¸M†Êa[äî%¯M…¦È;iÉzðÖŸ¼Ðî%2‚Ëg¥;·9(¬¡­©“‚©+ùÅ ¶HT2 Ùq YšúlK¬ßšÕš±BŸQK,eÃÌÂå‰Ãí¹½çÙEJ»fÅ~š`¯b£k0i0U#0€0V¼OÆ&Ƶœ¡p’ÒùO y0UMððÈEPŽý(mmT¨$v„0Uÿð0U 00  `†He00  *†H†÷  ‚Vv p¬:¢+ƒ\³ÍÓÊýÔ’”ˆâÍ2?ÀZßNÝÛÂúEVͶ¿J+]8ØôÎܳådÜðÜ€Ó¢VJ}&ã­0™ä}Ì-ZGÕ—cξØá³i¤½ÚÏŽ6ƒq:xxºAYj…ý}:õ9<\Èé³÷¯á,Íly‘ O®Åcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidNameChainingOrderTest2EE.crt000066400000000000000000000017471274666402600314770ustar00rootroot000000000000000‚ã0‚Ë 0  *†H†÷  0“1 0 UUS10U Test Certificates 20111#0!U Organizational Unit Name 21#0!U Organizational Unit Name 110UName Ordering CA0 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Invalid Name Chaining Order EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚¦{dˆ­MJ· óe«e}ÅæaÊ[†ïUV¶ã{l®åü³IÚ° ­NÜ[ãr4¿»=f"{‚ð™œó|ø;¡4ï0ÄFï$ËŒa”Lÿqªý¾L|g6I#âLw#»!S£Á­†µ€ ›µ·œB|Óÿß‘Ô[ÎïVaré(gñ}ñ«ˆü&4f ;g²:b -æ?QÙó7âÿ ½»€¯5(jÂ^Æ€°²YX÷Ž{ïvŸÝUÐ(Ì—ÓÌLÇDu޹Žp—È`j_KE"ÀÔ\ Ó×K,G }!´Æânê qr, ¶Cg ó*6hŠ»ÓDñ»Ï£k0i0U#0€¿J‹›MŒ1Œ[éÌÝ/èyQP0UW!&ß(„Á/¤Ý"FÛÎEØ(X0Uÿð0U 00  `†He00  *†H†÷  ‚2çê§ôԌѧFõ&wMþ€_rîÞZ<ÑÓî1“ù;€“L{–ßEáp™Ê2À{˜0Û¹Åa7v—›¯‰…ÓÔOÓêZOIe‹Åbå ª˜‘µÎ}ÈeüdÚœ¹œkgC‰f¶hž`e3&Jà!c\nêÇ‚ΗØ$§SË"6YqÞã©·ÇQd‹¿>$ôÞÔÍ:“ìüð¡ýoi3êr@¿w¿ `œ‡1ÄxÑ/…Rƒ†|Èx‡ДAYz2<Ø6ž˜)ÅOúáÅGlâÍ ¥ô±ElOÒ_ ßäΡiÁ:'ÒÎ7ªUy­y[ÿÔ㈘˜àcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidNameChainingTest1EE.crt000066400000000000000000000016221274666402600304720ustar00rootroot000000000000000‚Ž0‚v  0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Good CA Root0 100101083000Z 301231083000Z0c1 0 UUS10U Test Certificates 20111301U*Invalid Name Chaining EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚¿§n`B`¯OƒÐá·ÄÁ¿˜uön#”dSï=âÍ\ò{gòÃ†Š™™º:rX¡'¸¶^zñÿÇz¤9ˆuœÙ$Úç¶üV’Ÿ¿°Šï¢6r \Å  Aµ˜ƒ¿^²²Ï{b»«¹Õ°e®TÐŒªšNY}‹•¯v<® mñÎzR’§È»XþŽ©ònà‹Æ#-ÒTŧ-ùeŽܸ%pHJsžãƒCwnÏ@Ùäoµerû)/Î÷Á©å‚J[›o ó-g Ë a”ß[5<Þ\~ü-bŠÐHûëÛ‚ëηRž[;KÅîX–ü’ì%Ú2c]Ê‹£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0UÀ;zµù·~à*C‚½3~^uä0Uÿð0U 00  `†He00  *†H†÷  ‚y˜.'Œ=b€pƒ. }Jr?w§Â2…¯59w±‰a,Áö›)ÃòüÕQ!®”œ´Êý¹iß'4~+e!`ÍNû¨¹ÖRpŒ)¬ë4¥ 0<:]š-¾gfFÅ¡&ŽŠÃïúÓ@Òóíõgói‡ŸGH¬”œy¶ç¦9’þ»*y-åmuµ¬éÜpÚ{ÛS”¨8K‚A€¯kªw*b•§¶íhn‚—w•lÀÞú¼îÚ.ÚJÃþ›R!+ø^õi AÝJÃZ©)Ë™^–Ç^›SBrÆÏ>X©1­7š’Åcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidNegativeSerialNumberTest15EE.crt000066400000000000000000000016511274666402600323130ustar00rootroot000000000000000‚¥0‚ ÿ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UNegative Serial Number CA0 100101083000Z 301231083000Z0m1 0 UUS10U Test Certificates 20111=0;U4Invalid Negative Serial Number EE Certificate Test150‚"0  *†H†÷ ‚0‚ ‚ëb[ÔD}î¡Irâ_:Î5õ†˜¸zA÷€ØÍKHa©9å;~G+ä64AR‰ŽéšsS 9-ÚÇ7 còíò]·>´Gêµ[ç©mм¼Woe –h#GˆUŽþ±YË*N[<‚8å8Av51™èhâF–®YãÕ¼wÙ`çËSW¤Ç¦v÷MDxZÀýkNÿ$ž?¤2¿6ÙôÿB,Yˆ º&)¦î6´6Xÿ•ñÿѯü³ü,Ã'Cg¬(• ˆ°YómfܬÕά@†¼ÑM•uyKn$ÙÚÖ%u+*rÆ»XWÐÇË– ŠŒ/½"š©šœ~¤ÝT%öt+£k0i0U#0€bä.5ÆÅè‘Ð ÁÞ¶¯ÚˆÙ?0U‘ô1÷²â˜I”i[£r¿ -«&©0Uÿð0U 00  `†He00  *†H†÷  ‚Ij•U›õ2-¢½nP+œ< ŸZ‡1Ñ€"{FôÒäî)ìºb«F£;ðÛ` óšãymÂà®9åWÒ±µ¹íœÇ˜rK2±¢gû˜þót´>†éÊ/¼±6²Áªº@5¸kó5Bëpz?’‰@³’?ßÈ–0 Ѿë$Ï!— ÅMÙîV…•NS@j3ÞÈÌÊl”IYm=ñ¦,p¥¡ÆÄËÀˆFÅâ¸_r±j«4Û=Ÿf'é/4ç# ù;ƒX8~W3ðe‹ 8ù†>ËqxßY”¬~^¢uÊõh9+¥0g'ÿñÙ½"Ùäž—3§_­åÿncertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidOldCRLnextUpdateTest11EE.crt000066400000000000000000000016411274666402600313540ustar00rootroot000000000000000‚0‚… 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UOld CRL nextUpdate CA0 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Invalid Old CRL nextUpdate EE Certificate Test110‚"0  *†H†÷ ‚0‚ ‚ÅC¨mœÆ´gÖ#).y2göþçQ `b· mŠÉU¨ ヌP³e âÊtþxuÉ›•bÏt;”Ó“9„!`šÿ[Š!ã9UQ{-*¯Êdh]q Ÿ`œºmvú6Ê|i:ÈI/„Œ„lÐs}äT4ËXI³à¢Ì”tÊoªbÅ™˜QÀ¡)Ћ›]=$õdüÔlÇ=•Ôt,éæ2µrTÖ—ãFKÞ|.yÎâ1 ÷zzäàÿ¬¹­Ö„Z#ço¦¯’âõPøÎ oÄÅæŽ_Èàt`·þeVÃ]_ÕA·1‹#cþ¾K1:g]4?M´ƒ£k0i0U#0€ÎÚÚZÌŽ—ú )O¬–*Íx0UVvß  LÏL¦—LçhJT¥0Uÿð0U 00  `†He00  *†H†÷  ‚­hrŸ;H(äÿ°V}ÙÌìã êØ¢>׿•h Ôä9lûy»yçYªŸ»sdùV˜z3"ŽÞj}€±0òƞɗv‹AŸO>t°ƒ;%F¾˜Ó„CJ.@p pÁùñi;bº&Öè gnµá±á¯X×=§Qëó6Vd`BµÄoî9 Îʳ­P°)œ’ÆZ?²3Ò^ ÄÉ@‚"ôT툎D˜&YOMËa®z{ÖÊåG¥où3qdvB=Ï£0aÜ ìÃÂL€×líF¸zÓN·ÿx(”:D‹çªyû-ÀÓ;ü^Ü/Áˆò®Úÿy5ï÷ ÀTíŠ#©certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidPolicyMappingTest10EE.crt000066400000000000000000000016521274666402600310070ustar00rootroot000000000000000‚¦0‚Ž 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"Good subCA PanyPolicy Mapping 1to20 100101083000Z 301231083000Z0e1 0 UUS10U Test Certificates 20111503U,Invalid Policy Mapping EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚¨®Í›§jÃ¥>™]΀#1_–4ªH+÷Qëe ³4zÄÔü4.v"…˜øÎé a©Øk%ö›˜ÀסX‰á×ÜAð$a´ùV›Êm]åÔíÁ ‰/K½¡™®XT}´÷Ýrß…™5”Ø×‚ô“èçÁ¸¿DAú¸î¹’%‹ËR¾áðEŽ6”~Û¥,cf¤Õ·GO˜|Ú%>E·ÕŸ\}4—ËL.`mš²k›>Nªaº{-a3”çàKè¢ì`A*§¨ê6U=µ`ú¼¨Œn`ÔRð~º4~v+¯š‹ÕÇ[6myöi—NÄü½ýÍ£k0i0U#0€[sy™ã®ÓЦ3Nxä ±äÉ0Uñ¿þèÝ臡Î8w‚6!P}$0Uÿð0U 00  `†He00  *†H†÷  ‚¯z—%âcÎsiIÿ퇟a¿&íýøˆ!(ªòÖâ·+*Ì–vºÐ/è³ìv;“!ËÎ(ÌÈà†Ÿ6]–R|˜ÈïŒ'ƒ“qÈMµyyVA,kM½½ó 1eŽË^‰ÕÌJØ™ëà~i8P{ûùæ1ìë 6z«n3èµâ& ,ÖŒ0€ $£#K¶Ð* œG˜ÏùK ×ßïê”ÊÁrs>®¶Žžè¿¹Cú;˜Ì@+܌ˆ÷G%îmúá¿L¥Œÿr+€‘Œ¸’Nf1ÒÉÃK=ç¬o£¢k›Xoç%åmP"C³ cá}0ZÅïnWÎmcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidPolicyMappingTest2EE.crt000066400000000000000000000016261274666402600307310ustar00rootroot000000000000000‚’0‚z 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UMapping 1to2 CA0 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+Invalid Policy Mapping EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚ÏÑ™ÉÁRýTÝ9ÞW*Tò Õ“H s’ÿ]ÍJ÷AâŸ00™ñÓÊ2ís§lÉQÓ|œÃüø/Ï/Òì²l ð³1öIš ²ž–§Ÿpž…㕘fÑÅ1åºÈ%Þ´NÖò«  9U4ÄL)äû„&ð¶sÔ+O&P`¨/ìh÷ÍظèË¥–È›»qNYõiÁCdÇ›Ìô¾¨‡ïäŽTV7œï#¡&6å¢õþðËÂLåL+>1‰xfö §ŠÕÉ®1ÁæN¤=:rv)lú‰ú£Sü x„€Ò^2ˆ²Ò~’‚”d‹–:*SG’¶œ32ÀÚKʱðtŸMÃ<-£k0i0U#0€™ÅxiË=3v™¬Då°þ¹ôÛÇ0U÷z‘Ÿ°™7žtÇ0u¬KÖ!½µ0Uÿð0U 00  `†He00  *†H†÷  ‚ÆÅ ˜ÑšÎÜ<'K]lîù‹á(^cãñ'kÌKÏK† œ+·K ¤?i|TœB(tíÞW‚QyLs¨nò²Ó,R†ÍHãúyǂݦ[”7(Ðs†È/Ï^‚\­Ïqã¸7ës$QÚjx…ÂNžºzÆ3­K±ÒnÛ¬bY2ÁŸÐàÔ|p{›…À3è€ÛÏWŽç%t0Ê^KÙq­*—+tx§VT ‡aál:rõ9RuÉq§8 nK=™çgmBüF¯½Ÿ ¥—Œ/ë®"ï¡z…9ÖÝÌ ã%“…†{) ¶p­9€a‚1M¹Si• ÞÙ¾÷9@ Y¡]²certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidPolicyMappingTest4EE.crt000066400000000000000000000016401274666402600307270ustar00rootroot000000000000000‚œ0‚„ 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UP12 Mapping 1to3 subsubCA0 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+Invalid Policy Mapping EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚¸ç zý¯ñ–))OÅ1€œcÞ’"iCKDA ¤É’'¼z¸ÕÍŸ€Yäñ YùsèèC§jcSèî×€çÖØ?…ŠÝ}B¡íHÃߣOB|Û}NUI•’Æô“Ý'G ˜àe ŸK~ÖFê {¿—©LÚÝ‚àc}²ÔX}TóQÊ~öáÉ‹øKdþª»¯s½ä‚Á”­ù׊¶ êž>ì6DdÞ¡Ÿqü žðw<$ÔË‹†©!ß@j G³ oIÂ6Üøëw"ûñ!p=Ça˜¡º†Pú@åoó@뤆w›•/ÝVj௕dôk ht®Pg RÉòuÏ£k0i0U#0€]9>åª*^-ö®h*­3›=›s0UòžQÊ[ºÇ¶Ú̶zA®âR×40Uÿð0U 00  `†He00  *†H†÷  ‚muƒ ·;„–Þ¡bÜlï`Wß¶»cëÆœW¶~&­ ‰ný:*ÓÅ3™ÏÚ¦®AâUŸŒ—‘ÉaÈI°*Kkƒ5ÔŸõ 6kŸÓXš ¸kK¸¥s÷[¿Lü' î)Ò§Éu#ñFÅâr@¾B¨ŸZŒZ ”\`¡H¶ãó¯qÈ¥Èêj&Sú‰\"ÎB¾saÀ ëmýåvrÞ˜*‹Îéˆçv3yð[ñ÷A"C¢2certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidRFC822nameConstraintsTest22EE.crt000066400000000000000000000017261274666402600322000ustar00rootroot000000000000000‚Ò0‚º 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA10 100101083000Z 301231083000Z0m1 0 UUS10U Test Certificates 20111=0;U4Invalid RFC822 nameConstraints EE Certificate Test220‚"0  *†H†÷ ‚0‚ ‚Òú›3}‘JíŠ'ŒiDÓO*ñ:äøA1zè*XdÔ ÿë¾QS9Œ5Ÿ Ä-|÷?š,”÷%åêw|„°.¸³ÞT’AmП”s`—i•8j8ªŒŒÔê·ßöT,F#÷µÛ2aÔmOÔN¤ßy ¾¬ˆI¶©V¶¯ˆœoX¯l‘ââ$ä{!ž`œ›ç¬þ¼‰°(*¸U¯EycÖá±+y. ¤Gr³xöø7Z‘4UaÜûªÀSkç—V°OøGŠå†ifîëè®@×Ûã Å/ìêÞ/3t:€ËcÊ?B7áDAd»f¬)ÁzI¯'½£–0“0U#0€ÈjޱKª¥ˆ¸§‘Ûê3JèÕâ0UÏ„??þCÌ0v8ùŽ,žŠÁ0Uÿð0U 00  `†He00(U!0Test22EE@testcertificates.gov0  *†H†÷  ‚Oû-â³'ÇWÆ|ïVûµ‹iìPµÇ¯–…¢”Þî‹ìv ÆöIH{böø`¨à\ðœ²"û¼@²¨@ûKOÕ ©OÀ,¬­° Ô߃vjiN§Øذ`¤Åo°lfxó£9ï*+óïFåEµùC›Z»n„Ôãæ³ûÐà_å#Õ=ªœ2ýôæ’þÓ›× *Õq{tœ]OÑ8·ó’ÚQZˆzJñŒ‹Vd…<”À`±µÕÖ07£°ÒFÈ¿Ñ9èÿØd@â>øîòφäKË‹ñ°L¶ø•ÑoÎïÏ3©¶SdÉÁä/¢ÁõdÆä)èUY êcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidRFC822nameConstraintsTest24EE.crt000066400000000000000000000017411274666402600321770ustar00rootroot000000000000000‚Ý0‚Å 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA20 100101083000Z 301231083000Z0m1 0 UUS10U Test Certificates 20111=0;U4Invalid RFC822 nameConstraints EE Certificate Test240‚"0  *†H†÷ ‚0‚ ‚íЮ+p5˯6‚¨‰]4@°¦,£5‚ ’¿ìmÆPžpÇ-5þ*ÓÓ&ä2:±u¦ed"X ý7žÐ—;›a¿WÙõ9y‰l*+ÄþìjÀ×b0B’³µ,ÆŸÃùÓ†NËù_ž~¯+Úºð'7ýŒð¨ÊÅ©æ&J‹B ºnî.ŒÈ·cWl”öà[éȶ†èÿ©øyz»Ð?Gé.; ¶“Û&½è—î=Þ)@ÂÜB¨\š:? <) O£mÅ¥ýèܨyAc›ÉpàØÛ¶F ¯Âì7ÈXq¦a#éG#ŒÜêQ{AJ‡©tÒ¶s™l«Â‰¼ž³£¡0ž0U#0€Q€ÍúIrH<íN ÎÎ@ep 0UŒ¤:£L·æM]÷ƒèrÁû8Ð0Uÿð0U 00  `†He003U,0*(Test24EE@mailserver.testcertificates.gov0  *†H†÷  ‚0øÞ‚Ö¡¥d} N¥5:45Œ%/N´.|ë鉼Í~($`´×r'Ϊ >É¡ãÏ&ì.{Jy%ÄaŠ„è'K/m4jc±gÎF2§›Ò Y½ö“Ô9\±”…WŠeùØ eɺ˜–¢þÞMwÇÇ TA–Á˜òRš°W4¾æ´qÊí.bòÝýAòHj×L­y¥xõ&Œ$¡˜ã©ßé1E–%NÔ š&ôWp)F}†ÄÀ¿)O¾rVK¾ª*Ê‘þç‹SIä²´$ö¿èë–û8® ªlSÑ2Nô#”:ƒ·>Ëöº·ìÅå¤#½£ ; ´Ž.ìôÍc Œ$LK÷‚;ð_u›yóÄÛ>ª² 8Io^ò'Ås\í’Gñ@µYò›¯ Ýལ–0“0U#0€šº9MÚ!u¯êAÃŒ±9"NÑÊ%Ïæ",ršiã  >öÈï”û×FŽyÊf­$#)wÞlÿF]ÍcC´´2˜¦þ¼ õÌÉʳ‚KÆ%~Ü"Aß}&,Ð*q½n«3c ŸT±”s[öȸ“¯V@…kƒ8å¾uÓ/êN“åNµ$ïÄ^! ?#; Z[­wCJ0Óm«á¾éO%<€¬ƒ‚-,€^¤Øbþp?PÓêÜüÃC—)êç#=ŸPé€u’WYi&<õGŸK_XûìÑh8CËcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidRevokedCATest2EE.crt000066400000000000000000000016151274666402600277570ustar00rootroot000000000000000‚‰0‚q 0  *†H†÷  0F1 0 UUS10U Test Certificates 201110U Revoked subCA0 100101083000Z 301231083000Z0]1 0 UUS10U Test Certificates 20111-0+U$Invalid Revoked CA Certificate Test20‚"0  *†H†÷ ‚0‚ ‚ÙõŽQ dÞÖGÑ@Í1ó[0æ…˜6!ŒÁRÐ~óP!žFþqùþP‹ì]…A  ¨˜9=lÚçð¬c#¬î"F¬LöE-|b‰E0˜”èîXA?7N[v¶döNhÇ@ªM{›B/>šL*¢Ú Œô‚¬²Î!&iqèW° 'Àï;5©O:"{,!y»—Þ4xeS”lùy@ý†?á¶!òŠ£Ò?|,ÞAS½…¢/D­J(¡/ ­®–¾6Á¶>O¥;f^tg ,Ó1|ƒ€Sû¥˜#Ên-AqÌá)FTÉÁüKÑK?qŸ®J,s‡ÛÑ–„äî£k0i0U#0€–o’™ évt»_ÔøûÙÏ ï0U¬ç&šÓM†ô`‰êä±ã‹hƒÆ0Uÿð0U 00  `†He00  *†H†÷  ‚rûw¹Žs÷%Ŧª/.HȈ¹H‡¦Ë .(o×ÓBèCèøTäSA1žˆ ˆøÕ‚¸@{Ó`}h¯ÌäEt8ÿ/î~Ð/Åź~!¿Š(ï|M!;Eý 7#‡í{fŽD¿KíK™ÿ|ÚôàÃû9u»ÅO´»¤¹i°„ËçœÞ5‚$”_Í–µÏ•.ŽÀ¸à1mz„ýüºûöï•Û3?Jr åcèN§W&„46‰{·–fËyr›÷NX’¥Ôà}ñ²Ì`A[^CHèkÊUê,r ú–»÷ë£/*¥ÃÕóöÈPAçKÏŒ¸ÿn9˜kùÀcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidRevokedEETest3EE.crt000066400000000000000000000016071274666402600277670ustar00rootroot000000000000000‚ƒ0‚k 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0]1 0 UUS10U Test Certificates 20111-0+U$Invalid Revoked EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚· ¢øÚ¡1ÔõŠ^ÞŸ`«SÛ"Xž†RÒ:‹}ý´Ù4¡jƒÉí]µ¤Ý•íÑ0 :žË¹èH͉6ÖA¥5DUaÂŽë/®Õ&]}dt‚2ãZá•vV¹ TªV\ÍKÙ¸€åbéáìÉDT‰A_ž+3ëü„Ý;^jÎ ÜîØÝLÉAÏ „ÅÌÍ7–HEkê/'yÛ4kêöû£ƒ<¡”ÀOe;Û‚~êE¡õï_e¡Àû Ècë»k,Û°{‘œý€=ïô¾æŒîcS”¼Ô¥¿fçÒ(æßw߯¦Ö]™ÜÁ »¸bÞ¯5ßW\ÍÍòèŠëÖ¥3£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0U¼½œÞ!õi ˜ÍhZË|0Uÿð0U 00  `†He00  *†H†÷  ‚‚]î& Ej½6Ê™Ç)` Â"1YhxYé}˜”€æ$”ô/;#ÄS Ü,MƒhÔ§Bzÿ)ÛÕ Ê;ÙžgD´ÃQèó õG}ܯ£BÞgq¯rYê¦~í»Œd2¶Tl™ÃQhR¥|È6MRP7¼ãP“Iö³Ù³Íy¡·¦º„ð Šo®ŒpT„H¹!GXNC´°mžBH^ë`eYi¸äk°Û«š‰Ê$âéÚP׼ȑè‘Nì2óÖÐH)6ªOŒÒÂõ± Ÿ*Õ·certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt000066400000000000000000000016271274666402600335030ustar00rootroot000000000000000‚“0‚{ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20‚"0  *†H†÷ ‚0‚ ‚±x`­ËZÒb%å9÷ü ¯Zñè¢TòÉ¡þ.Fž™ P0¼1§¼Œ]+DJï(9C€y‡ŠÄ^†zDଫ¦Ðð˜pÍIÎH6Ý3}Íý(Áðñ"¶‚, 0MYèX¬0§D¼÷€FÐêÈô.£a íɯä˜TûË“øé7§3+׌þ¨•U* ël¤7g½Ðïýo §`u¡"änµ*ú–]@¥–£ðò6€ëñ‘¶Õ¢8ƒVÔÁv˜\†Zôzá[Ç@ÐVOÖM³LüYyRÇJ’{_eºS€;¨*z}í|~ Ë•^G:¼ÉØ]+& übêÉM£v0t0U#0€ŒÜß~dÛb¾ÛKQdŒjfØ\££0UתãìxŽÓµÙ$ÄO©F‘8’0Uÿ0ÿ0U  00U 0Uÿö0  *†H†÷  ‚ÃìÖæv ì»¥©>ÏE§Þ¯rƒN–6[ù絨}³ìP¡Ü«‘Ù4u*aEá°côñÅ9lжÑêJÆà#߇ƉâãR n¾¼¦A¸Þ áî*v§tã •œútVxo?f‚­'[¹\áî©¡q|Ÿtü·K¬áÿ‡µS£tבv´µ@H‡­rÎjsz`…b¶œˆ#{7˜›Ãªì¶d*P:IK§h~÷¨jø“€·µƒ_IXÙ†ñÐýaóLšÌßê®úPq4@Á¢ëý*wÍŽm§ƒìx‰†,ÍVðA ‡†Ê´ŸtǩϩU´¨{Žƒ”âvƒW;öŠcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt000066400000000000000000000016601274666402600334270ustar00rootroot000000000000000‚¬0‚” 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitAnyPolicy1 subsubCA20 100101083000Z 301231083000Z0r1 0 UUS10U Test Certificates 20111B0@U9Invalid Self-Issued inhibitAnyPolicy EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚ÚÆ^ú}‹”Ué-›&H½`œ:¶‹)îÔ¾ ¡%Ï@ÊÿÏŇ™T%J®ò^Rs^Eö|Ð'¾zlMŒ‹À W FääÿµŠš&wZîxØž3 „ÉñQÓiêeiv¯4zÂü•ÃÌzWáMÅÍÂèßh×ßBeÒÝpI%`¹ô˜Ìù³¼Þ,žñ¾+õ:ÀŒÕ˜þo0Óå…52ö)o£¾×ñwÖ‹¸*5F–v©,‘$Í' (®F!õ±n”*c jI+c\,]ÒRÜX°:¯: åà½8hAÑàŰ-ì•‚F¬2 y¢ÕÂË›" b° ÜXí¸¿D§e£k0i0U#0€}ÀœŠvùI3÷¤KŽ0u•;èˆ0UŸç2õ’f‡µ!(CË‘9רã>0Uÿð0U 00  `†He00  *†H†÷  ‚˜ëÓjþªn*ùq¿ :,GìßjCô¥ÀÆW Àz‡W¨º…ýöˆàÝO.ÍûqŸ[Îubu¢Sñ6×pÏóÉŒ –ü=­puæ“y’ÄÅš¼¤.RÉÌW^ JÉD©¼g^Å7€Mð0û…­´ýÔÓÛHÓÇŒ{²KÏÿÖNñ eÃÞíÐ0@ðmRõó›I°’<îSR¬Lv°B†´–¤µ#ÆE …ÕÑ3‚yäȮ䘬nñáÑ&X‡¾>H}ÅU…ªÊ€'*«³êIY¸ûº¿aÐ^V5{Ò4ã7ä~'~žˆïÜ)ù—ÐæÌPg78Ct±Þæfù×ã~7¶InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt000066400000000000000000000016701274666402600342660ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚´0‚œ 0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA0 100101083000Z 301231083000Z0w1 0 UUS10U Test Certificates 20111G0EU>Invalid Self-Issued inhibitPolicyMapping EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚§”wë¿R‹;\™©#1Ke …øK±vgÅþ–„Dâ¾bfœÍ-01' Õâª'Ô¾{kØñ@ûèÅ#qÕÜK®Ãèðæ]Ùq-på±8ezŒm¢ÁÀ§UëÛ ŸÌ(+iŠ éńеÁýú€yöS$ R“I4ôÛÖÐaå ¾²æ`@qߘ“ð-~Z+i™Ü )Rê74Bv)ì­ ö7%Z¹#ÜZj l(´ÅÿÙtÎÏÒ¡Eƒ5óò´TuOaðy‹Ç–Aèå||]ò4ÇþB}ª­ÌàF»=º£k0i0U#0€Y¹ldêó®–ê¶Q\%;Ïíõ“0U*yxÈÆ#]ÔÁ0FZ:ž~ÏnŸ¬Xúê±ÔDMó¤û^>R•EÃ.âÚMtÖM)¬¢öŒŒgkÕ–°,Fƒ»;i“ñ ë¦ëÅÕ¢ÊTðr60È«2ñóÕpCí©TŠéK¤”¨óòe(÷Õ]Õ+þs úZJg¤ÌfEŠÊòORŠª­ªŒ8–'A©ŸZ§ì¡ýLj>–Ë”V57šY|Ö¼p‘ïÙµ&Í’$ÃhºO%HX3¦· ÅšµírÖzòÍhìTìÄD­WÕÙ ‘¬bmWß Žqš¾–B,‡InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt000066400000000000000000000016701274666402600342670ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚´0‚œ 0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA0 100101083000Z 301231083000Z0w1 0 UUS10U Test Certificates 20111G0EU>Invalid Self-Issued inhibitPolicyMapping EE Certificate Test110‚"0  *†H†÷ ‚0‚ ‚íFëY?ã\̆ÚÊû§ë-åíñ¢ ÇÎMh%JyØ(å4Œ67b}X6æâ·Ö±» “];­MÖ €—pж ‡GëMh;‡Æ]NÞ› ]œr“j;BÌ«_%¼DŒ/š‡Þ ¼‰> w»²RÐ=áçÝKÇ'•M«{hùíIpMF¹­è'íVÁÕ Ü¨˜f ° ‡âFN·D¿×ÕÂf½‚©§†.™žü( Rk¼<4­‰Þ¦ñc%\4Ç{Q('%P+v_¾'öLÌ¤óØ½¦Nš¾X9V+)¾ôƒÆu²8wi6ë›ÚY£k0i0U#0€Y¹ldêó®–ê¶Q\%;Ïíõ“0U°IŒì÷ÍT|pЗo0à«¡Ç0Uÿð0U 00  `†He00  *†H†÷  ‚J…ÛÁ'SjÜ‹ ™Ë<5ïrTqLÆ[Ã7tþXîŽÐôÄ"ƒc2ûd5™"jŽ(¼A…”UXd¿YFº\z’›ÂÿßÁÁÑëyƒ¯Äg´ä ÛËéŠ€ŠŸo»ŒnýIDp\bÎöNµ„V¶ÎÉ ¾’-N¯†T  žÄׄ‰%c¾ ~úé+Kê] «çÄÙtLª ל>­Ãâ–@ºM¢¯ÿDnwVoOë+£Îé-þ¥”’Ö,ê¢×òî8Å=-ÎòT;âë´ÓF_ûÏËÓ(õ† ëçç¦é…ohåøo1 ’5‚ò<]Žõ¥(÷¹jd²¯ÈÙ»+InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt000066400000000000000000000016721274666402600342170ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚¶0‚ž 0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!inhibitPolicyMapping1 P1 subsubCA0 100101083000Z 301231083000Z0v1 0 UUS10U Test Certificates 20111F0DU=Invalid Self-Issued inhibitPolicyMapping EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚¶ÔÕ›ÀŠÃ&˱pîM.F`/`x£§ˆÞ:K$#6¸ Ç0ÎЉ¿®I„t;ðÏÓJCóiö ‡W‚ÑŒÍùl#;J£Kj…÷¿Óbýð«Àd0³ó×%j6KeP¸÷ÿ!ó£­Ë;Û9Çp-câ¾F-Žû×Ä`Å|:5âCIs±À›EŒòÌ­qIS¢>/mì7Íqö'ª&¥pq&¢JW¨†°o\Íø¶R¤îÔ•k¼î9±|ª°Ý†GMQƒ„͈ÎåU ë$¢ÓÜÁ°Ä\4Ù×0tZÆä†—o é„Ë’1A| ÊûÐøoþL*7ë£k0i0U#0€>Et¢‹ÒñVŒFfxp$Æ"Áž0U²IŸŒ_—ý¥@òU$Ce`º0Uÿð0U 00  `†He00  *†H†÷  ‚Ý×Ö´ tÍ[‰»È-ãC†ÇµZº*>‹þ—a6©ëߘ:ÒþåÂ8Ô\³¬%貃åþP|Èм*Dô Gµ=:÷âðõ4ç.ÝÙEЛ*¨6Y/õO°M?¿ÑOC¯jr7­v’nOêaÂô\Økï']RoD%pçmO¸|È_ jl%9ïËú9ËXç¡ÎxŽÂ1ª¬uÚj$Jº-žh|å{%¡I3,rèý˜´JqtÀžu”§ÿOε#¬+Õa¹9Ñ7¨ïl»„zY,ª+† ÔIzšP¿'ÊÁßÍè‡ØË¢8’.]šÿñÎInvalidSelfIssuedinhibitPolicyMappingTest9EE.crt000066400000000000000000000016721274666402600342200ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚¶0‚ž 0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!inhibitPolicyMapping1 P1 subsubCA0 100101083000Z 301231083000Z0v1 0 UUS10U Test Certificates 20111F0DU=Invalid Self-Issued inhibitPolicyMapping EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚áì6ˆS´"¶˜%Àd0Txƒ8 ƒ e‹ø7Ð…¹¯\3=p´¿"€G+}ÛK±1 …êæGåD)Cúë2õ¹1Ã< 2 w«£ÝL{l³?"}#œ‰Bëߨ€Å“ôk£Æ¯øÏÿÿÊæmâ’‹$2a[£qŒ¡¸è| Dî£v0ý÷&C•ö3Gìwè5â¦öšÏÔA=Ìî­Š5ñ‘Eú.¥ IxïÞ&ž/¡ÜЩÄoï,!‘h¥ì±Éai‹á—Eè3•bK’*/l†ë"`¶¹á“UêôѯJY”{¥Ô³ËUÿvÀaÆ{u]‰tAÀŽã£k0i0U#0€>Et¢‹ÒñVŒFfxp$Æ"Áž0UP“ìÖÞGýwdi Éo†îd~f0Uÿð0U 00  `†He00  *†H†÷  ‚]áúkÐQ.é_æ§i¬§G¥pfx)V´IS“½@óGðm$'#C±èëò¦x¬ç9¾ó\˜ô¦ævU/94Ð;]BÄÅ­1á‹õ³ü)ÜULß$s•wÔP><ЊŌu¹M‘{–Ä„ÝáéÄ©%ïJ ‰ÙmÅTl±Ñ›_’ñPÊПY ¦súÕDIf˜ \Û ˆ³ˆ­ý(œMŸÂ¹åâT²]•µdbž.èZﳨî÷{É0ò-[Êíh鈎™ˆãÎVÂzŽxn×g{ߥU1ŸßÊ '[âée–¤))À;§ìù¹YC $QŸÊÕ/CHb{Šcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt000066400000000000000000000016601274666402600336700ustar00rootroot000000000000000‚¬0‚” 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint0 subCA20 100101083000Z 301231083000Z0t1 0 UUS10U Test Certificates 20111D0BU;Invalid Self-Issued pathLenConstraint EE Certificate Test160‚"0  *†H†÷ ‚0‚ ‚Å%¤¬hdªª4¬dÀû¡òÁ[ I•8ÙûApkz¦9„ÿîˆ~-ÕX!ظ:¸*áFó£ñyp7!µü´b¤µÀSÓ¶ï{†*ÆK2Q-Œ¡/ëñÛû¶î$fLÞrWÚ{q/å<ŽËph@ßü‹\ÑWØáÁ#³{ùT¬~ðítÝKI~=•ðŒYsâ´Òx%»FYB~.£÷ÉJ‘)hÌ‚~‹Õ!xàð’ÙÚ-Æ%ÛÖ~Üæ 6Ýæ]ùUë]bv¥e.бDà %µáôãÓHn âÖ³Ê7…y¹Änö\iv“¥sÞàA–â‚ÐCŒ éùxPA£k0i0U#0€Æ *û¸é>h`zǗγXQ{vÞ0U÷Ç›Žñ¤Lû¢t±ó{U”é‰õ0Uÿð0U 00  `†He00  *†H†÷  ‚F•êXgœ®âlfãEÙI]¨Ç‹´ö\‡ .¡U´ËôÕI^€òL Ÿ >º\æ9èã}„|q=\ld@J¾;4XQ-yÔZv¦±–}š?½JK¡êU§hwŒ¡¼~ăóRŸE¢MsøÛ˜´¼ª"U¼ïô‡“Pv°Þ{ÀņÕÝwÏÕPº·à:õÛ‘ÌS‰ ¾ü2üv¥ý퉀yr¼ZRò»›7i:Ë+(e„d‡¨\câÍÇ™Ôk¬pS¢æÀØ:V Ç»†‡ ¸Ü¡ñCp_VÃ<^+'º£±Qñ€ÏÉ91j¢»é|y ½bÎv˜ùêëÇûƒÜhÃûNInvalidSelfIssuedrequireExplicitPolicyTest7EE.crt000066400000000000000000000016351274666402600344310ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚™0‚ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy2 subCA0 100101083000Z 301231083000Z0w1 0 UUS10U Test Certificates 20111G0EU>Invalid Self-Issued requireExplicitPolicy EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚ÊGåŠhúù×$šáýfn|a‘^\?9¬%·Ÿ¬®×Ô5ýà€¤Îýuý?é!ѶgmÖã^% ÀÛsÒ@R%믪»Öß:ñ{Ü »¨ ؆!l éd?l!xÔ|æ5·ƒJêä]4ä¨ÊGéV¬Øhl#c_V̘ø¶þMœ©Ã”MÛ<ÙVÜ8s=gÐ_¸Nô(ê,Ðy 5uNíX÷ùŽ \nAm Ó O[c3†JŸ\ö÷ä΀è`?j3fFTÁ¡ ¶¦Ûã—3÷ÿw ·yQŒÎ0,öÇ ÄÆ¼Ó±Púv6 SìÕ©¼~·Ãk‰gëÙÌ?A£+£R0P0U#0€ wþL0â³Q°÷ƒ˜G0UiÝ8<¿B9aBM÷‰¡d}`+0Uÿð0  *†H†÷  ‚½„Í, =¿¦÷·€¡4Š˜jW”«9H-'?Ã9¶UªCI £·S±,M- ¾×)ó·u|»sOá'¼Úza ¡CÙæ”q–pP£ëN)~mú²mŒ]fZ€Ë¡Ð?jŸçèá O’Ð ª”ì%’>0TEe¡ÐÓPœžSž$Gf”!s³óƒØûM'îðÑ)}RÊAH¢'Þ¸B/Œu”hêX Ú½V Sp©Qr.oåæ³n×›ž‘K„+Çhß|Ê)¶­ë®f?Åá£âUôè¢d8&ºŒådHå8ð×XæmÇÝç£ ¥ˆöH×(Õ|&#Í\w†ì„ž?¨ÌÀ§”InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt000066400000000000000000000016351274666402600344320ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚™0‚ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy2 subCA0 100101083000Z 301231083000Z0w1 0 UUS10U Test Certificates 20111G0EU>Invalid Self-Issued requireExplicitPolicy EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚Ì¹é ®X¾3á?áZ÷TäTGƒxeoÖµr$¶\çXÌàˆTæ´Ë*0€¿MYr@•qqµ4 í5r¡\[VPãV} ÞÑö¼b ¥òÍ4#!QwòsäýÝì­äçe)(yvXñ´²8/uºvwÖ‚;Ý7Sí.שfx~ +øà V;Ý:6:_½˜~ õ$æ³çf2 4JýòóIëÈžž •_XJ£Þt™á"µQˆÂJç,a´ïÚkC=Ù6 C%¿ŽÃV€Öĵ€ }âLâ_•©‹È—¡½ó_|Ø bÃ7@ÔûznË„»NI¬¡£R0P0U#0€I gaVGÒY—¯"f0QwPªÜ¢0UÈ.•`´àâ`¢ù6Êz,Ìn¿«0Uÿð0  *†H†÷  ‚=xènàâc öšñü.n •ƒZ{Æñ)=£ã{P«#—ªŠ@òúá dyó|;lÆb(×͵÷Û)ð¸@Ђµé-¤§C•]Á«ÃepÑI¬ý$¾äEAÙîè¾gÒšþ¾ý:£V» ÅÚîÐ+a|`-jžÎ¤Ùq¶œ¶úü_£2áäI{pàø›Ñµ¸Øò-€‚Ô»Ããœ;¡QÕ‚t%‡É‡úd¢ªËšxëi_¡LªÎÓg_ºWê•÷©`Ù<×kÍð ¤Nÿ ;¨“:†Ÿ…ôÒ /»¨¥CÀW;8î FQçJ è]ÿF…S,vòÔóq(‚InvalidSeparateCertificateandCRLKeysTest20EE.crt000066400000000000000000000017001274666402600337370ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚¼0‚¤ 0  *†H†÷  0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA10 100101083000Z 301231083000Z0x1 0 UUS10U Test Certificates 20111H0FU?Invalid Separate Certificate and CRL Keys EE Certificate Test200‚"0  *†H†÷ ‚0‚ ‚²öï;r&aÚ´˜ú9o­y}øâ¯F1Šèˆ5cRyCž÷RѲ5¼6ùu°.´O.Å.®»¯6¥=y`•Æ]@Õ®¾ü‚‡P5ξ…Ëø+ÊBP¿a/ä¿ÿ« ÖoW°)dûå‡qšûЦWÚïY ;3˜Ø—Ë‚µ¡[ٳğ©Û?°qùùOG¸9V\ӌ碛©‡ÞФôåô#ÕņJɉ" $*?¿[Ò8q»g` ,KÏŒ%À5³"!>K^sÉ¢±¯÷_m°ì§ˆþ×…0b]óÐ6³?JSÉxð³.`I¯ÿ%%ÒÆg¡‡@:ؤC£k0i0U#0€ðeÚ?ZÞÕ¶H™;×L¤0U&©7Ñ<ÖzáK(84'BfÄyÔ|Ò0Uÿð0U 00  `†He00  *†H†÷  ‚få§ ‰ô ‚ÙJU-ûší¾"sG‹ªV/S€Ôd+K]:NE¶œ œ$YE„óÕ­'Îî ‘Þ@ž¥›²InvalidSeparateCertificateandCRLKeysTest21EE.crt000066400000000000000000000017001274666402600337400ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚¼0‚¤ 0  *†H†÷  0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA20 100101083000Z 301231083000Z0x1 0 UUS10U Test Certificates 20111H0FU?Invalid Separate Certificate and CRL Keys EE Certificate Test210‚"0  *†H†÷ ‚0‚ ‚¸zÊ6Õnà£YIH”4«ÚsƳ6R¬s¦›éýL®„€°Ä·©Ê4]‚ıãHQ LÕý…•!ô‹†p8'¯9=İjDQÓ´oL‡¦·¼x~#Î÷DHÉaö4Sã ÁYZÍFt•%² ËÐ: ]FtHGƒÖy7·C_׃5núáŸ%žPΣ«²ë7ç¼é5yl‹4&ígôé“ô(€âÄ-áÉIQjJIñ=ÚÓ7³B$˜@¬ÛŸ“€‰Q[+À{*\©‹`ß'¯œ È&™?í&êÞ™‚ÈcUKÜ—œƒÛ @Ê2_ägþ)ùËÉ«`:4§£k0i0U#0€8£8ŽNEö¢â@g›tà0U\|ÎP$¯¥wé+U½¹}0Uÿð0U 00  `†He00  *†H†÷  ‚S-Ïâj–žnµ¥ÄòOWv¥„Oçü¶N„°Úì,-ˆQk\j[ͱòPêìQÎà¸b‰š—ÿ|pT¯šSJsåÏäèîÈsªÉÕBkÁæ~êÞ7û/¥EO™ xgª³·~’&•͆@_BüæhÆ4KÑ[È ÜeG@‹%r/$nf¯L©©/ó›E;ÐpÕ-Ù…ÿ¹FÏÚ]«eAv®zUV0w— ÷o‘ê’wœ ÿ‹0«CÉf(Ãj:ðÙPP ÉuZ‘u`°òg÷mäû|¥b˜E-r«§7ï²v°Yb‡ø?VMB¶Íy»LX:Õþ‡ÕæÚcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidURInameConstraintsTest35EE.crt000066400000000000000000000017331274666402600317730ustar00rootroot000000000000000‚×0‚¿ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints URI1 CA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid URI nameConstraints EE Certificate Test350‚"0  *†H†÷ ‚0‚ ‚°< ÑÏŠ.ßÃo–™¸}ÝJ×>¯8“ïê›Í'½gj 5¸°ÊçkùMÉiÁ•9 tÜ‘} ’ÎFh# nS ârx<äîÖâÀNçLVȃ3H&Ìtzã7=Ú—ÒÎsT­‘×Üe«´ÇŸK×SŸT´ï§è •9—~‹+dñIý¡,­ÓƒQÿ¼2Òl¦Ö@¡Å`º¨ì tá”ë&®OìZzØ‘ª¼1‹Jx¬ØäqVœåý]z@"o챌¯è8v*¸ÏEÙJæ3 \üÙ˜Vªs«a‰c! ™?)³Aê Elá½à…V£¡0ž0U#0€ú(­AÞ*hÈ#?&Þ0U¢Bà•2íåí¯ v¦}( æÓ0Uÿð0U 00  `†He003U,0*†(http://testcertificates.gov/invalid.html0  *†H†÷  ‚XúëZõ¡*êÓ2úCP¹/Ôã‡Þþ¿ööºH8¦À´í7ãÓäçè=° ¬-ÄM7\"WrûÄnâÜ»oæ£4|dñ;ê’ÞWMïïu%›÷¥üÌ»L¢ Á´¿üœfÿI Þy/67ó›4c * ˜Ä>£ª%†EÝNI¼‹Ý·ŽÌ€n®Öž"‹##™QuWÕwì³åï ź{k¦¶ú6Bº—Ö%°Ë$x‘2± î)ƒ¡&ä:L j:í™ä²ä"Õù?}¢_?ÎUH¬Ç„øó%y|´¦.é;¹fzîn¾Žé± kRG´ÆðûÖ*€­·ˆcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidURInameConstraintsTest37EE.crt000066400000000000000000000017331274666402600317750ustar00rootroot000000000000000‚×0‚¿ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints URI2 CA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid URI nameConstraints EE Certificate Test370‚"0  *†H†÷ ‚0‚ ‚ͱºÓ¶+g»ï‚2‘ú¸þÃnm2ÍÏ®%ЏlíEØúwg¢·„…·™–O®Á§èã2¦ªïæ:úÇ›œ›õ¦«gGóB‡\~_Á3Ó 7…Þa8Œ(@¹¯E9ð» ðаHsrük&íë~ñëã{R­w@ ìâÄùÓ&+’dœõı÷:ÁŠ~òÕq³+Üżê÷ÚÌ\µl¥Œk¯#ê§Ïí ˜ø¿æ ¦3mví#úáÜÔZ©‚ÓöòÈ2®»æjìgõV_D2±Úû=5Ò¸[ štöD*/Óý†|Yo¼Ì5š9Ê~=Lç‰Y;I‘g´µ£¡0ž0U#0€Më‰qßð²úv:X±º`ÝŒÓÃ0U´ŸP6|ØT[yðŽv©%ò¤¹ 0Uÿð0U 00  `†He003U,0*†(ftp://invalidcertificates.gov:21/test37/0  *†H†÷  ‚Aö½”*Eê1V+…âÇ÷~þÑ ‘ü“­+ê%Ì>˜NÏ-lƒÎîoN%’ßÏI£ÂÒòº&ß÷6gÐÕÈQ?zguùðì=¾=i°S\áÂ}qGúYÏe€|T+€–K¨ZÝüÆøJÁ› …†B²Ri»I>½— ò„é0aTb×,^&¹Ï$b/Ç8@”zÁ— BžÁ|7=°¦—nƒ¨ÏŽ.Ê+Àn…'ÕÑþþ;ZÝaVüZÙa{øvgð§e/"J÷8¾x!¼O»Hp0¸^çs>2YGK0ýçêîîÚ53Çõ¸†æ1(ÐE¼¨EDÕÄ}certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt000066400000000000000000000016621274666402600331030ustar00rootroot000000000000000‚®0‚– 0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UUnknown CRL Entry Extension CA0 100101083000Z 301231083000Z0q1 0 UUS10U Test Certificates 20111A0?U8Invalid Unknown CRL Entry Extension EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚ò”$ÐŒ4FÚ2ù‹ù¶ÁÌQ ]~ˆž¬ù›±Z}˜æF.AÀzó¡6û§ R¼5áb\û4Fˆku°©Ä{=÷ñ¼ž8¢Ó|(I4Ç+F3ÈMç»-o´þ¨ €MÿîÄ›U{=þ™¯ºÞ¡_ø£…ƒ7À+jÿ Ñ‹è¦k7|ÂŒóv\ G!Ò¡´;wÚÖÓuXBûœ±°à˜ 6¨‚ä`3­)÷PT(þj,÷öD$(:m)§É²g…Ñ#‹.<âIÃ]]‹ »¨¸‰ieË€y­^5VÃO•/¾Â5f^ _ s¿ìðÓšD9u£k0i0U#0€¦Ë¡-M(/"óÒL7ÏÿL0Íê0UšáF%e†vZ›M"ÉóRWÀu7¬0Uÿð0U 00  `†He00  *†H†÷  ‚†‰»JÑ¡M‹.×ÃûN†Ž Ä­·©NúF- 7L³_”œÕ½ÑòÔxÌž‘ hœÁ«qï,×gñ×r#ùôÏ܉ũï·sƒS`€TÍ^޹®ëÈiSPèÈ6Ö—X´Qq¡WátþŽÿdýìg–ñú}rò‹jÈz ) c=º¨âêz»ñ%–x‚fÌt¢W²<@ð*mKÄ‚*±Ú>·îË3å 2*Ês1ŠaÎÍA‹‡ÁûY(£Áôø£B ¡òcµD·ãî[ª7„=JïÔwvù¨Ì>UºåE‡“ó\Ÿ½˜¬¬Je? sD tëF;bö‡·ÇÚ×ealcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidUnknownCRLExtensionTest10EE.crt000066400000000000000000000016471274666402600321350ustar00rootroot000000000000000‚£0‚‹ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UUnknown CRL Extension CA0 100101083000Z 301231083000Z0l1 0 UUS10U Test Certificates 20111<0:U3Invalid Unknown CRL Extension EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚¬oýÚ]©P Ãmƒû¸ ê0W.™ãbï%ãq\(àôîS:|ñ)ìvBüÌ\yƒ-èmIø‡Bšå{ìÛäÚOYÛÓéÿ$6Åçbf’,š ù-9Æ|Ä:ZXt.4`\,f¦œUܺÓí™g¾…êĹ'”å“<’5Oµ˜>‘Ṉº7ERz‡®ŸvLOŸß"ò𤆧vô¥Š-¯gÖïÐC¼HbµÑ%ùmˆyˆ^ˆçÉå5cjAݶÊö\C]žÊÚºÚxßyÄ ÜwâçýÓñ;Q€o·¿fï:Nê Ömì3'ÎjÂHÀtãk0i0U#0€ýÿþMÛ Å¢Ø‚Vë°Ùaã10UëéVw[³5ŽÀi¬Ï&TÛ@0Uÿð0U 00  `†He00  *†H†÷  ‚+Nqé³Ó¼ü^l×C˜¥I!W9ïl­Æ*øN°m­tâÙg¼(F,X&4‰®Y„‡¾•=î¶Uÿp[Ù’‚?V’i-AV^˜¹Pß®’³£”Ìn€R©¨ e+Äwo×”ÅÕ|–œ¨žI0ìNÎîmª~ì^dQ¼ÁƒØjr pꇔ×CÕÿ€G¦ø¥9J£»Cñg…Æ©þï×eþE¤ƒp’Á”u:çÍCT`9…ou0=+Ý]“.ÛÖ³ñ‡*o‡zE YòÞÎø°e#â£í†çUÛ²: l]Ö±é•ꪂ»™LyM¬J™ÜïÍÐ-certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidUnknownCRLExtensionTest9EE.crt000066400000000000000000000016461274666402600320640ustar00rootroot000000000000000‚¢0‚Š 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UUnknown CRL Extension CA0 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Invalid Unknown CRL Extension EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚±—kÇ7 ‹BË\fÍ_q˜%¬­í…Z™»ñ(ŒÕÁˆæ®H›…'ñ£“¨§ .›vfžÈÈœ/ÿÌY‡4p–õ幤˧ãyÍü6ÏÚK‚ŒD_a7·÷䔳¬™…" Þ†Ð<ŠB³ÐÉ¢ýLÄ?(+ŠbwÍ$Õú(g-‘vmjcÚD6m ”'¢ZÎôØê°3i3ž¨îBnä¼”xc?¡hÇâ¹\Tô*ذw´Tªãt³ ‚e¦àtK(ªC»UߊM* ø3}#wC·¹o}bÄ‘áò‡–¾2H„™Z "cÈn°»K£k0i0U#0€ýÿþMÛ Å¢Ø‚Vë°Ùaã10U¨‰ééîÁ¦f_ Áoõ+ð¦X0Uÿð0U 00  `†He00  *†H†÷  ‚+B{rBm\ªª#<âZ©– ]ÈðÑè½ÇÎ÷!…]šAª] 9•sW9ÕÁ­ó\Ç —¤Â”P©ÞVÅÅÖcVvÁ&îñQRžó†øQ'kï©åÿnfo¥-ôÂJ.C…‚5gIê&J‰w³Z¤OIs{³W4œFx†—«ŸŒ7‹Õ2¹¿¤oiåÉÔ0Ù/°Ï†K>øo8¹Ù\i oKÖ)Gø³º-Z‹øµŽJb;óy->è=>¾¸…vgÔ”0Ò>oßéc<¸®Ä|ëñ²JBïÝž¨,ÏÕ@à/«1eTÆ„Ž^'&Ø‹†mÍΗInvalidUnknownCriticalCertificateExtensionTest2EE.crt000066400000000000000000000016721274666402600352520ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚¶0‚ž _0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0u1 0 UUS10U Test Certificates 20111E0CUì¦ÅÎ]&l[OéfO[~¥ôÏŠ6"àMÚ[>MÑùÅHø€°hpBûÄïtÙC°¯ÿèþM¤´/&OnŽNÖN›{ø¿QÌëâO¶„má³!÷|±—,JÆbålMMçÇ·WE—$Oû6;Ä29 Gb–eÓÖéý}¨óZ€Ó‹ÎîäóÊçKø` H´nñ"6t X³E£€0~0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U ÑŠØ·H§žÀ&6Ä«w+Uy¼ÚÌ0Uÿð0U 00  `†He00 `†He ÿ0  *†H†÷  ‚’ó+úùZÈVYsþ©'T©>Ö9øû…Ð |ГâÃkGFè9ºf^ìªBUVô` ±«Å6^2ŒCŽv<³ÿÜ3³O`ê‚vêWúú:)%2䚯ÃË£./ØI’œÑ- „­°-.ÿà+¹Jb?Ñ«r­É÷l®{Çi¦.íàÍk˜v½KaxHø$$Óˆ8äŸGUÈÊ/ÑÛàz6mûÓ鯎ޞʎîˆ*4RªÃÊ…udV´Ó)dàH(zzL~ÅÛ@Å Í/æÓNâsÀÙŒrþ¤ásý<=£a<©5‹ÍN¸Kœ*»š\»ï€D·YïdÓ£EÉJŸÓO‚õcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidWrongCRLTest6EE.crt000066400000000000000000000016161274666402600276160ustar00rootroot000000000000000‚Š0‚r 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Wrong CRL CA0 100101083000Z 301231083000Z0_1 0 UUS10U Test Certificates 20111/0-U&Invalid Wrong CRL EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚Ä´”©$>}þ`oðõ†àÁGƒ’*cÍF½p_B+× Z{<Š“)td}1èBZ‡]Ø>íÜægtËÐÙðQÃLbµb)•4ÛNã×Ó¦9ŽéV`r-®Å8x­?í“D<5y._­X,ì¯ZnbÛ¿?¸a–9lðVÛr:|4‡‚(GíÇR¾ì_šeG4YFõËÞ +"5…N­¥þÓ·ëV~Þí jŽô6hIðî1Û##æÛŸ<Î@fN1—«-Ü/k×7™åçaûˆÙ>áGÚI¨c8÷ÜÐÒAÿíz"ùYÎÒ`Œ2©Ä8~t ”¬ŒgÎ×£k0i0U#0€ %Fà‰zQJ¯5¯ÍÄr·¨0Uƒf³H².}¬3¿ˆöÙ;ò p¼¡0Uÿð0U 00  `†He00  *†H†÷  ‚".U|ûèè 쥽#8 žMIˆÜQÒ‹iRŒšll¼ x3—j96¨'öIøŠ°}À)ûËápͺø—G;ß ¢ØÛÔvÁã¿eÞ–€Ñ ×Ù~€q”gdxàÜp©%Å2Dïl¥W£k0i0U#0€pßD/™sò6<4Ð Ñòí0U|¸{˜ì"ˆÊ‘PÚÄÂ.|R0Uÿð0U 00  `†He00  *†H†÷  ‚b¸PÐè­ÑS»ÛVhzìý½•ošDÉc¤^ËlxÞ(€Áß‹ëzó5“HŒÅLÈ{xóµëLUXâgJ6Ât±¸ó&Õ²äæt憩ú>’þ¡eÛ3À„ú.ÐöÒÙßw×:s*¤j»>çJ7ƒËÞU ùõl_·òFz"+QåwÞïŒÔg²-¨ï žaTÐäSâI,3ßcC¶† [ÂÀƒÏ×PíK J'Ä‚IB*ž õ}œ=OlÑbiµ` @X´á;LÀîŽ!Òͦ:•œÎ¥»)bàŽÇ&¼pÝÙƒL„wÄO(ã‚V±v‰în`0üÃHCfZƒcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidcAFalseTest3EE.crt000066400000000000000000000016521274666402600274540ustar00rootroot000000000000000‚¦0‚Ž 0  *†H†÷  0b1 0 UUS10U Test Certificates 20111200U)basicConstraints Not Critical cA False CA0 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Invalid cA False EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚ã*95Õºé4 m«™%¹53Ž[±ùXü€AÑß QØhµh:m:äb÷°t’Y#û V•î´}LA¾vnñz—åŠÐ{ÌÅå’šøLUÆfv JeôöÖ¾~æxM#èsµmeÿ­ø‡±kº™Š¼Â!*t}ÝõñhP€Ê±š‹§©GäP=v{U Ý8Î<ªˆíæ$‡ç „k aOžgq5éæW„£¢Ï¢YˆbªSÖsçÕÏÝZÕ‹¹.(®®¹Pj¯N ç¹£Ä&ÌZvŸ@¹†9Y“àtö›Ì'zGgä÷ˆY‰_ÂÒˆ­&VÚ½‘}ª×ÂÁ£k0i0U#0€9Л·O)7¾Ó°ŠvêjžÍïF¾X0Uø[hýˆ)mÉ¿J Ž›ò­uÂw0Uÿð0U 00  `†He00  *†H†÷  ‚m¶A 9&i‡¶¢ÃDð"$ÿˆŽÚFÊ#‚²!ÈbÖè¤óÇ#Ü^3Nº;Ô„Ý«a:á@«/§;uBƒu)­¨›¯uÅ9ç3Üä~IÝß“ªHÊæv$]k:ü[_À7‰Jјm˜§ø #lÝ‘(o}ÜNð!©ðòuI¹×M71Ä¿ ¦?ºÇ{5Ü-¡¹‡?§ÇÙµŒÐlÆc¬p°±.9®«},­Q¿Œ{?CKË' 7•fR=²WqJ39nß’+?Ý‘ehí+õZwn‚êæ¸ÓÕÇ0Ñá}å¿Ôçq_eÏs¾Jš¨‡Ç_4dÖŽÚ¶%áá‚]ûÙcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidcRLIssuerTest27EE.crt000066400000000000000000000017471274666402600301240ustar00rootroot000000000000000‚ã0‚Ë 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA20 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Invalid cRLIssuer EE Certificate Test270‚"0  *†H†÷ ‚0‚ ‚»ÉT%úaW¾©Ä_}ÏJĈT䟳NEª;>^6d"é¢#Û†çg1ª©Û-b~-ÝÄûà Gå7?7t¨~×?g[pÄâÔµ‹²™–^yáÏ–:6ʘ ¹¿—™@´NþJ盼kL~{@nx3Ñ>13)'_×½| ’¼Ëó¯»oבy÷>“¯R¦XbL—7÷ƒØSt,GÌwN–ÅíX0†6g·Aº©þ'£EºoH3£h[–†$k ¬þQð3e¹´úrÁT`ú òÙµ¯¹gRÔ~÷–l ’ Çðõ0ÚÄ ŽRCm”ïMIU¢\Õ²·È>“£¿0¼0U#0€ˆ#á³³òlþ1©¾‹aª;’‡¤£0UU"pJöCÈéïÀÀRŽRv]Ïk0Uÿð0U 00  `†He00QUJ0H0F¢D¤B0@1 0 UUS10U Test Certificates 201110UGood CA0  *†H†÷  ‚_ßr§\u)ˆAp o#X¡düÎ ¶Ö¿õv }Zê/»à"iÌZz£ŸºÇAð{©<¹Ù–8Ò­ÙSˆ"W—è¸k„jDäÀeÒt ;gë׆ªÿmIÝV|†¢Ë‹¢L0þýïÑôò‚ÉbaéAÆ©hªûkK;5Ó1%D;EWyXªe朮™lø¾;rHÔv«ùàµ^½–D?ÈV €œònÅcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidcRLIssuerTest31EE.crt000066400000000000000000000021601274666402600301050ustar00rootroot000000000000000‚l0‚T 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA60 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Invalid cRLIssuer EE Certificate Test310‚"0  *†H†÷ ‚0‚ ‚çY•„b%F§•˜]cT)¨B+Z».ÏFHk3VÆUßS±ÆkIV¸º,PñÜ/¾¥C¯ÇÜ2×v}G¦ë×Qpôw·a"züÛÖJÑàG¢ˆ{ò~m„ó³8™,Ð7Õ`ü(\ηìõ0ß°Ò;’tÖåÉ6AàŽèU4ÆY6Ry&¹hh"ð6PQqô´ ¿‰×ÑgæäåîIOÎÖ#Å?ëŠóg¼K*4a.±ožÅ¿ŽÂÒ»6œêîA"½æŒni$ƒv´ýM1R€t7<妩¹¾ÁÌðÊeƒiŒÿt%€Ïãµjìê×Ç'ç¤4µÆÚb¡£‚G0‚C0U#0€É £l-wOÞBô ¶Þ*v10U‘ªíu’M“V³—Ûr8©!æ0Uÿð0U 00  `†He00×UÏ0Ì0É y w¤u0s1 0 UUS10U Test Certificates 201110U indirectCRL CA51)0'U indirect CRL for indirectCRL CA6¢L¤J0H1 0 UUS10U Test Certificates 201110U indirectCRL CA50  *†H†÷  ‚²]É Z×S–¶#Ãõ²ö2î(®©±³9þÔán¬¶ö4ÁYKù ÿþÂtcÄ»àë‹Å/‚^Dy,žJõläÒ…A!-öB¤•eþÿwæžk„)AYÊ©Üè¨b~©õ¤k%ã5mäÅ¥Üß{õÙÉx áæJY¿°¦íEšVîöÀfÛgˆè5ÎPWJ“O #¿æhšhø‰ Y‚Ò^sÜ?·s— c²¯‡ÁšuƒkîDæN—Á\ðK&¬m€'’½Ÿ©ãbË~9‚ÒÆÛ#gnÎÓZ‰’æ^•œ¯Ñ—Nšª ¬qxÉ™ê„]â&Iýo¸±_¡÷ÅÜ"#certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidcRLIssuerTest32EE.crt000066400000000000000000000021601274666402600301060ustar00rootroot000000000000000‚l0‚T  0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA60 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Invalid cRLIssuer EE Certificate Test320‚"0  *†H†÷ ‚0‚ ‚Ô‡*Pw–_d?ã§Òß‘³Í—›çŸÄ_ §F'^“'®˜ùùEºÁz ‹ ÃL–{’k*Ÿ#ÇQ ÛÖ\ ·èò5jìx!—å žà«© ¡Ór›5ØBÜNü£Èdºÿ:GNî €û¼¸éGèx¦Š†Ø{¦]rcUx%Ý„ÔzçÔŠ|ÜÝù¼ÙÖiÿX"ZT;¹³ƒq`ª‡|¦IG°†›70çjNÞTØäÉ{9±wK>¨ŠAò‘6LáäƒHö+z6ñÇ´'QGíGÆï{ÿ\Ô˜. %;Ŭ< ´ÅØ Ъ)³¹¬±× .ÈÊÛM¶Q„„+IÙ£‚G0‚C0U#0€É £l-wOÞBô ¶Þ*v10Uó,%1¬A@<Ÿ\üò+:¬Ÿ?¨10Uÿð0U 00  `†He00×UÏ0Ì0É y w¤u0s1 0 UUS10U Test Certificates 201110U indirectCRL CA51)0'U indirect CRL for indirectCRL CA6¢L¤J0H1 0 UUS10U Test Certificates 201110U indirectCRL CA50  *†H†÷  ‚~˜É¡Âe|~=es}#P$)iA³ÙÅ{®7Ñ ÑÍuêv5‡Þœ¢ ²ÿàˆÍÙØ Q&ýC2>a9ƒa­L-Lj‘¥I=uƒ…AÀ¨Œ~œ¯çi?¾8úì„æÆ{÷zc.»\‚wÕKcß»½v 5»g7élË… ñ¯UêŽ ‡»A˜åT¹÷UZýóV/[ýónO‘P”ëYéHQ}F˜HšJŒø<íMÌeDY(Ø{˜ -ÿ8ÉÓ”¨ûÄÄkìlmß KA›6ê>åx!*ë†Ö[k_Å®ÏV°É<áË$Ô6Q’ì4d‚ì¦3R¿â.9Ùœ&certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidcRLIssuerTest34EE.crt000066400000000000000000000020241274666402600301070ustar00rootroot000000000000000‚0‚ø  0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA50 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Invalid cRLIssuer EE Certificate Test340‚"0  *†H†÷ ‚0‚ ‚¶LýH”<³‰Ñƒ2»ÐA±0åÇ d9"ÐàbF½“»zÌáZwôîakŒÓ+ÀwÄÕ 3Ý‘ óÑ×áº3˘¢Èv²–ïÙûö>÷9UYÀT±÷8â˜)°Y®!] áíI]ƒ"z¦a·Öqç»f©=Žk¶óD ׫ŽEÆuô û™²×¹eµO.d›fgþqc­G¥ûÈÐì#Ë 2´pŸ÷òŸÙeÇ>Ï[W“w µG8€nBíÔKbdRAØIÈn.î™`ôS«W¶ü®Ûý„‡«~…Ÿ¿'úÈž…ÅÜζ@•ܰbÂ8^­±7 ,e£ì0é0U#0€÷ª½HuY€°Ïß#Ø“F‚³0UŠ#1ÙñÒÝ@E“AI&‚€þ0Uÿð0U 00  `†He00~Uw0u0s q o¤m0k1 0 UUS10U Test Certificates 201110U indirectCRL CA51!0UCRL1 for indirectCRL CA50  *†H†÷  ‚mTœWsœvk×ÇÛ²'?o`?¼˜ZµI×tëÈð®Á_iÓ­0q€d’øFÇÇ(Œ/œáh×—Ÿ»äÛdPÇ2ÚþT¬$]F„‘Ý\"¾FÚm³äÌc—jO‹Ùª‡ á>?]Ç«®d[3ó ¡_wJé÷|¤C ÜKXà:zØgz½Þ.ßéè_ÞÉ@ Zȉ\.MLºÙÕC7pòÒ°ö”ZÙºüÌÚùa•vEÃå+Æ¥÷Ò¢‘8º—ïR¤â)P<y³£é k@Õ#Ð ú”'iÏõ–w—ÃÀ‘Àç§h9°ËAèY½ƒ#Q0—?%Wcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidcRLIssuerTest35EE.crt000066400000000000000000000021501274666402600301100ustar00rootroot000000000000000‚d0‚L  0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA50 100101083000Z 301231083000Z0`1 0 UUS10U Test Certificates 2011100.U'Invalid cRLIssuer EE Certificate Test350‚"0  *†H†÷ ‚0‚ ‚ÁÞøÅ’~FÐø[ôkŒ»޾½]–œŠA…Ù¢“>±“¸¼]Kj}‘úúÞ³$Hº cåÜmÁùÍÌ Ö¼%LB,»lL(µ^h®ˆL¾ýÄÒòM+AÿÀÿÛŠfú§ (U ­#…l¥wJ#³ö|ûw›ok¬Õ£)Ë«M6àôéÿ·«^ož´¡ Éþ›ç‘å9/ô*Áç´çâÉJ¡ÊÅÓK…t(ª˜HÔÖÿ¬nî€PoWyÒ£¶Nü»‘‹»÷Ž3xP=._£¾œ`”í²}ÀHXí™ËN‹Fá<`?‡È{.÷öèÇÇy"b–bm¹Š ª³˜øR(”×á¡p‡.)ÿ.o5ä–Ë]^;‚+ijª?Áú>o˜-JVÔ@¸W$ Û‰öGŒ'„"sÒ gV-&´¸ !ÝV¦certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt000066400000000000000000000016561274666402600325370ustar00rootroot000000000000000‚ª0‚’ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UdeltaCRLIndicator No Base CA0 100101083000Z 301231083000Z0o1 0 UUS10U Test Certificates 20111?0=U6Invalid deltaCRLIndicator No Base EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚›‡ ¨èâsIÌ£ê>ÓGUü'ªršâæw~Ý&ƒé4ö§Ñùb*Ë€.j•ôL—_Æá¨˜÷úçáΈd¡Ê½›í«žYÙ=­ù¯7y×!ƒuýŽÍÖø÷°¢Íñv ,ä.‹)u’—Qùéú¸$ÿ¹ [§LÓÐO„ÛìAf Á^ÇBã¹W~Þ‡LLÜ?€šdi™•5°Üè!Â]/ÅÄú3Iv¸êë°¬8 XȪ&6¼.#‚Wz6ˆãöguö⤂í³ù¿‹Ò°ûc ‡§±ÀîBäÍfëΕ‘Âqö_›"”/q¯Œ@È ^"Y“4ÿ~ü¥(5ç£k0i0U#0€ô8v%«¤ãÀÈuŒkc#¶Š0U^^™Ü t€ }ö%Ê㲡¬çä0Uÿð0U 00  `†He00  *†H†÷  ‚Iýåo;'ï=n“!¶Bó~œõŠèqÖÉÜ~Eši8dCÊ¢«X.8fShG'1F]¼dûÐ3Ó)¡Õµïa;4ZUÏ ™i ô"{in/ˆ¿ê¯‰p­ãlü?­ìJÑ êÍà©?•PÑÌ,]B%§ËY¿<š÷8d”ð‹Ë…¯‚tì4CC05vÌü"¤@È„bVþ~õ®B»Û©†¹tÂFOš"@ͬî£v3 [†ŠIì,&}ž¼TmÜuéç“j¡¼ÀI"dÿßò¨¨Ü>'Gv›‚vÁù–ÇH€dÝ™øó8‚&ÊjxË‚˜®C̲ certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddeltaCRLTest10EE.crt000066400000000000000000000021061274666402600276610ustar00rootroot000000000000000‚B0‚* 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA30 100101083000Z 301231083000Z0_1 0 UUS10U Test Certificates 20111/0-U&Invalid deltaCRL EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚¼@.xÚyCŸ\ eþñ1”ëç't¿“®W u’„™¼V#Ãy»BÙeÅr@¹D9¾µá0Õb {ì][÷*¡ÒÿÅ`œ[s1ñýn ¸‰k> ö÷¿ ¿,¸ÀâÞ€IFÑt­2­‰¾bêèÛTôÐ*ÑTÁpn-±¼I€ŒßÔ­/;jjb(°ßR·«ÖBŽ¥2U’´º²üÂ2O;%rYzŸd,èûí8£½’ÍÚùýãnµQ›‡J‚uT_a³"Žê9ÕÀг ÅΣFŸˆê}ŒUþûÌöEóµÉÚZ ЦˆLñ¶Á÷Ž«¯1§ZU?œÏ£‚!0‚0U#0€ïcÓ¨N±ùßaâ ã˜Ò“™ç0UÝYêXqt¿ÍçTЈšŸ”»0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA30XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA30  *†H†÷  ‚ªG—³õ jË,e?£î>!¯Ö4; •Ø’í²¶¯êxx æ\ö€W6sëùXj<6‹æøyT1›z³¥¨Æ)!²ñSi3ÿÝÁsüì¼0“œµÝ__-ÑÒ{[>€ E§ ¬Ý-4%ËDºˆu 0OS“v䔪 md)öx•ϧ•µ6Øç¿zk!á߯ŒXlètÈ”*6é·ýla~ÖãÓƒ`ÂRö1ñq7³‘DN.ÅïÆÖšRd³l[_çè*Ç;«iª .’ˆkñÙ¥¾Æð²ùȦ°?ËŒŸ!"@ÒÈmã8£&ê|¹ÜBÒ–1}GϬ½Öcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddeltaCRLTest3EE.crt000066400000000000000000000021051274666402600276020ustar00rootroot000000000000000‚A0‚) 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Invalid deltaCRL EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚´¶ö¸r—B)zAb…=´Wži|%5ï¬`Åñ8l_ëR¢ ¯T-à£íj«®ÎMžmw’¨XÌšJhÝÎô‚O|4mòžu7É‚§·ÉgxåUcä¼É÷1æÚê¾·ìÂ͹5,æ)Ò&kmdÞû³8eÍcBê—X}G~B­£äVXÆe|ÚNO‚Ù•ªÂœlÒ“ ªÔ?Rù1ÈÌÙ‘bæVÁà8æÎ°b˜(ˆ•_îé$tÔÒlù¢¹-ßë¯cЂ_†·'ëÝNx½YNpñÿ(Üкit$/ÐC.@ŽD8TŽO¡ËºHž&W[5󼧾«£‚!0‚0U#0€w#åv„È”?‚Ðêt±à¤/30U¦Áå8e¥Å¾™ÖÆ}Yí¡à²Ø0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10  *†H†÷  ‚`y 6áuºq[Á‡Ò« 3ØšMïmq^q3ËÐCØ™¢ôÅ ÄT¬Ó|õ2bÈ“ªuœ¶Ž­zr±ˆAÓ’w~‡U†ŒÛº€ËÉ+wI+¾¯i`ïã Sgyyù’ú_;ÈZ1/ ÝÇ%@%‘yÛŸ 1\É$Þ4?ïÇ­&·î¼:+*a³€&?oÀ8Ò&»pA]ã(zú æéŠá|à ò]·ûÖ.ÝQSÀD_£Òu½9u׎U¬_¬ Ø®·(Ú]wrxr+ŸS!€ÚHåEyV+[c´à É䈢ù3㣱÷Ï0ÔœÓè›úcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddeltaCRLTest4EE.crt000066400000000000000000000021051274666402600276030ustar00rootroot000000000000000‚A0‚) 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Invalid deltaCRL EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚™ª$"ćNµRN‚¨ÂG[ÀAÈÓ!ù”è­lQ¹€œ˜W;T¹pV£µ°)‡ñlSä<å™Å››AVMulà§‘mcKÖóEsèB:3íh]¥T‹jÁk 5;fU ¡ºxù5£GSx7V¿/Ž¿þ|‘êæQ-í… ~›)Žýˆ†¡ Ÿ#°`„žnhÀ‹‡ÝâÇ5_Âjp¯… ÜÎÕ&GÖ¿ô‡èÙÎÙì†99b»sì0ù+C:"þä(aÓܨQâí¯ÙsÄqØtæ4ÒÎ2?G6-¶"­å 5øäô.o‘LFèOø§£‚!0‚0U#0€w#åv„È”?‚Ðêt±à¤/30UÈÅ…3ŠúÃX¾%zO`š6àœ0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10  *†H†÷  ‚X†vœalü'i¼7<6]bÐ{ :öãøë5jS4Z¿æÀW–ÄÕñ®Vß¹ýH+h`o˜§Âë¾¶ Ô-#²í•¶d„H„äµÎ0ÒéΞjo6Ô{=«gH%pYÊ[s*¨}çéF›žŸ1Úï¾ÿBYɳ½–kÑnyîâ‰Iú+ºúØ\‰=øû@t_ǨHB#Źòl0׆Ž}xJy×ËHîWˆgìä †‘$yAA‡™ÐI¶QÛ«¦»–Tðd뎭 í ù0vBž-èÆ”S³ìŸµpéµDÓ1‡1ó¨÷ŒGWÍÀûÝáÿô>çx^LÐß´R“þcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddeltaCRLTest6EE.crt000066400000000000000000000021051274666402600276050ustar00rootroot000000000000000‚A0‚) 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Invalid deltaCRL EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚¡vWâ*$Te³Ô’Ï‘ÿgäA{ƒWHLÂK0Jýõ-,·tq¿ô]“c9ÐIÁõªiŸ#,'±õ—cÈW—Õ¼Ôîq üèªVln” f¶Ô‰:¿#šVHw3hQ€Å¾x+ÖÊÄ¥ßö>¨ :ú¹n½§•§¹h a§ ev9Y|z¾hŽËhW^!o¼£¢(Qήtî]{kïNw­Ê0à´ôÜÏ:¤báÎBŽa3jÃlÑ·(¼hfEòôïÇ¥‡Åk›/Ùsx% Yÿ*29ÓüGáCÎG¾µáP˜€&B.QåTL Zéa»ê|6¨~Q™£‚!0‚0U#0€w#åv„È”?‚Ðêt±à¤/30U²’)õ¸ëç ÓÆàkk°8„8?0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10  *†H†÷  ‚52rï¤åà̓úÊYk;ÑÒnx@GrV5¬Ú¯¿CÙÙ8†/eý¹í }*ä_¤} IŸø  ~gåFÓ ÅMînúɆiâ·î¨p7}">íe`õ WŠÁ¢ÆIÛŒVm5=¸ã¨qµÂê3^9ÛŠ¢¯úƒN=s£ftê•K_×Bá#T­SúmtaK=X^«ƒã"˜÷…Äò>—UPÓ¸^*f¸û7 u/œÅžjW¥*6Aâ}hà ñ ;!¨î8 ²l L(€T)ùT¼¢–Šœ™ù'«’³óáH ¦ÄäáFª ,°ùvˆRˤRŸÚÉøÿ['öÝžR, åFÆç¿J'Ç‹pPÍBkF<ìË\–4™eoÊAŽ4QÉ 3gºÝ˜ys[vZf¬¤¥O÷§4Æ9yf¿…G?uŠÃ‚€J†=Ÿº0·ǘZ”ÉP|?4_ª¬&6’dŒÄóÅR(ø{(!gg˜ Ý&²ÖñB£H8Å<*Ócí@LÈj'é(3u©ÜTGÝúj 7ÅðŠº6Ñ„é#mæ€UÐef°—£…z‘ŽdÒ°4¼ü#MÊèKúÕ¿rê?Ö…?)Ó¾ö}ò )#n%!¿îá8íLŸÚ˜S«E£‚!0‚0U#0€|Øö¾LÎÏ·?¡»3«µ×ûÄ0U”w¤C±U¯›¢ Ùjn™$¹ *0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA20XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA20  *†H†÷  ‚I{=V@0<òýqƒðâ@—úÏÉò°f¬¦].êoIÖVî6!¸&qÏF¼MãEéJ8DŽ+<'Í2… Ù‡ˆŽdð ¨Ú˜ àÔìË}äƒà¥N«˜Õ<,Õ•¿Õø º­3AЛΪp®\ŸOcÕïâKp<Æ[î`̸îŽjýÉŒ ½¡²x×y…í(ïœ+¿þ}GÅ•SÒÃytÔ}’7¨ºwaÜvpþ-¸+Ó«rDákòΪ4Qì`ÿ¤€,@rØ+ËçhŸ<†_›Ÿ=H‘¢y¥ø‚r[Áª{ƒ‹sg&«‹W;ÂMíT‘ƒiìcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddistributionPointTest2EE.crt000066400000000000000000000020571274666402600317060ustar00rootroot000000000000000‚+0‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint1 CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid distributionPoint EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚Ó`ﮊ9 ¸Pé?øÝ–Ÿ– gþo%ÿ7é>œ²ÊËV¹‹YD–i*7ñ‹´vÖ±¿† ¶5©VÑh Ý/Y6¼ÒbnEÏj,e;ºº5è8&fDÒùlq¢Å1ŽŸX#Ý'W9p•s_ö;XëÚèæû¢±ëpšOFE¯¢vÆÍ°ŠŽë0¾EÇ›0»Ä:Œ´H-jȶ.ÝSø!P18ݵ¥‰~¼›|É'µƒx)ÈoáNE&#ŸI¬ &¬t,ñ]4Ú¹”›Ô`"úz¿Ûîp7 : Yàƒ”t3gÀ9CîÉŠÛz£f5ç:§†ö'Ë'Ëh_EÅ?‰ þû.üwÓÿ‘«¬ûK$ê‰<'tp îþÛxâiyÇ’Iö¶ëqd7±¿–òXÃø~øQk¨Ù:2ÚmÐô¦ž1¯¯Á€›ž|>æIùÁüœcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddistributionPointTest3EE.crt000066400000000000000000000020571274666402600317070ustar00rootroot000000000000000‚+0‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint1 CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid distributionPoint EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚ÂLGþø§xi&BG¬ÎÏO–¯†3é ô÷ÏõwªA:§µÀQxXjnCu Ã¥ÈD¢Ôºæü[ã$çÏ0kéÿ†½Så¼'ØGòͲË$6î4N ½ §7vò¾pTÃ\Éìá`ÌŽPQp·ì:Êß_Í‘8àÛ¥/,­Á*oÓâÂÀ×|uÚj\Æ€(L£LS 'H¶<ØûßÞ>Z?…ü—/×’À œó¢Éýkîð·Ž|‹Ç©8 6JÞ ôŸ ž×„nh¿ª¤SnDÑH›Uƈ#`÷;û;’ÑﻹZnõx¶mïeyøò©g°Â}ò£êÔu¨W£ú0÷0U#0€0s½p(‚ÒoÏÒ7íÍë#‘Ûï0Uf¤²$ãß´t±ÄëÁìR­çIé0Uÿð0U 00  `†He00‹Uƒ0€0~ | z¤x0v1 0 UUS10U Test Certificates 201110U distributionPoint1 CA1&0$UCRLx of distributionPoint1 CA0  *†H†÷  ‚j ‚b“*¸{>š3hÔ ôáX{³¶íiL0%aúy²Œ€ŽîUHýì¾Ñ<žÐ-h–_èIÆÚOÃAÊYQlµ¼~¸€Ëß:Z+™Ó¯£…ýHãDqüwìâ#‹§yŽÑFÙŽyp2Ám\¨p˜uÞ’Ê;ÊÓÀ­õìð"­¥{ЪfÌ!j³XìiÇGÓ‹ºØŽ Õj…OR€7Yx§in½•Ïç,¢5º•¨I%< §ã½§£7CoA ´¢lçëÆãy —ÑSß«$¨ qÙªLfí 1±¤´€˜µÀzÐãÒßE©^ÎaP_Ù3µn¡©Dcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddistributionPointTest6EE.crt000066400000000000000000000017301274666402600317070ustar00rootroot000000000000000‚Ô0‚¼ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid distributionPoint EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚•àˆ#~Y­ÕÎγ—!vNå9ïÏpª B%?VZ·¯°û?-¯aE£ŽÑ†¶ $µ‘’­B£g×ÎÖ[ ,Þ,œ2HÁøxd‚þA¡)§±—’r¨ÿ{eÂçm~”}cÊSò)*Ãǜֲ»wyf>‘~W/Bëö.gÔZŠÈ`/ø¿•Ï7M¾pg¦íb¨݀íŸm?ˆ7ߨÉÊà.þ¡·ŽÓF(ä†1’)ə˕‘Ü7£ƒ:pZÐ͈Mâp0&Iß”µàù(£O¾f€2¹ýZ¾flÇBÿÍB-F_“Œ–®—££0 0U#0€DlîÛoëNIxþÍå ì»`k0U{/§WÚE78N‰–õ§Ù³l<’T0Uÿð0U 00  `†He005U.0,0* (¡&0$UCRL1 of distributionPoint2 CA0  *†H†÷  ‚MêDæ&ÐäÝ9b!ŠÂqäW·Á@0,ær®”¶ \«äÓ}6Ú¥,ñS( Ê¥‘$é`<5tÜñQ:°k†×3(gDÚØ«õ±ù7ÏpÕ“½-  ø@©wö›ÕˆÇ¨Šâ²¿àyÔñ.Bb¹¶ÛWf–ÏÂÔ>˜ÔûÓqRnwŠ;\Ø:õ˜D©M_ëTº“´f㋬ŸcBðøŠ€¶+Ïð}Í™ MBY1§¨õÆjio§ë¥-©Ñnq“ª÷ó ìŒÒkXwa±êÂæŒ úÚ>FL6ŽêAȼEE‰qò㙨ûý/nˆ–ˆÃ¦›éøÏ9&z¦Z^Kcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddistributionPointTest8EE.crt000066400000000000000000000020041274666402600317040ustar00rootroot000000000000000‚0‚è 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid distributionPoint EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚¶ÓzNÂÁYƒ‹Ÿ¦ÄýÛc(ŠóÅ–ù„Àµ(§jPì)šÐ€W3þ)TõK¾ÍÑ+4‹r¶ße—7ƒŸ‚»õ`Ë_K-¸ÔÙØn-©x¡¸v%ïe‡>E¿©¡ú_ÜÏ»Ðm¨¤`¥*jG´?wû®Òi¥¦¢—E3?¢MDÅñI¢æ÷ K"Adfìö†û©¹zºo×þG‘ÓËiÚ¹…†¸=œÍg™î&! ÍFíж®n}«ÂóI$N¿8iëfªž¾pRµ9DÓVmOú®K›!Æ—'çA#¦ZçZã×óBƒcx)½õÅÙ-‡ïßh»^·ê8Yu’ÏÜÓW£Ï0Ì0U#0€DlîÛoëNIxþÍå ì»`k0U„#øx¨ùT¦:ìk½«®~ÅY0Uÿð0U 00  `†He00aUZ0X0V T R¤P0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA0  *†H†÷  ‚Q^åÆcL*,[QnðuýY.š5ŹºÌ‘FúŸÄXtÙA‰Z;Ô,az}vÍÈ[”y¢ÇЄ B°J I”u«=ÜÀ Øãx´ì<ÑKaAˆ«ùˆ%”€»šÁb ‰^¼¾ Z$õG­Ûýä½{–‹1 î®™n ô+™4n%7‰úÎÅn¿ˆ‹'Ѻrw—Å^K°ïF#â&0 Æt>*1Ñh£ÒÇÔÏTIt|ÙL×±5ºE›såáÏ ˆÿÿQº¬å”îR(ÒLæç—ÅWÎHS7 ¿.ÈŽõD'«­jKOeìÕÓú†Š5Õ¤5] ¡ˆÂcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvaliddistributionPointTest9EE.crt000066400000000000000000000016371274666402600317200ustar00rootroot000000000000000‚›0‚ƒ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid distributionPoint EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚Ë+)<Nž=ÛA6}"BÃ>7þÛfíŽ*€´’û¥¶¹\rS§e‰!̳RTã¾ÓÆ ™›\DUC®Ì<æuEnbàù¶Ð‚_ùe`˜U îÝîË–âK=ßLÖË©üˆõâ«Æ&½z=!S[Ý'‚µ/EÁH:di÷¼nø»“fk–pù4ÉûRƒ‹³ÄJL'ÒE–»·bCø#M³ú‰e—…{PÒUɲs‚ÝJvDãè¡ÉgpÌñ©üN)‡Qº”i—ÖIò ¨i /A[ÝžÜ3ð;0U@×n¦‚#ÙÞsäÜ`U^«¦6Œ&U¿>+é Ð éåõ¤í£k0i0U#0€DlîÛoëNIxþÍå ì»`k0U„ª^#½0à-T.èõÈ‹ô 0Uÿð0U 00  `†He00  *†H†÷  ‚*Éx …jN¸ xKÆ.!z†gÆê!\¯ƒýq X²ôšÞ˜Ú³®ëK…l bÃ0uÛ ?Aݘ8ˆPÆÚ¥zãbçã¹T+ ø¤øÝ¦y;ÃQ¡;ØÐö«Ëá–ç_í)iñR¹jëîÍ„îçÉ¿:-t‰Â#ùJÝž¯Î'Oã°Ê®±$M¢X›e„"XvÐ4þ•žK‹^`ì•<4es†@ú‰Xã;ËŠmå-K²< '|*Û-¸8”ȇUËS â•^´„å˸‘–!Êß~sôÏqˆÏ=ÔÿÔâ2ýðRཙyÖ,é„!kØs 2Mcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitAnyPolicyTest1EE.crt000066400000000000000000000016271274666402600314340ustar00rootroot000000000000000‚“0‚{ 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy0 CA0 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid inhibitAnyPolicy EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚°ÕµÁ;b|ÕàKþÿèäÁöt›H¤°Øâ‰ÚÌó'аQ¾µf«É0êÒU.gÃ9*år¨ ‚æèSkŸ3þ ƹ-àŽÈñ^Æ"åÌU#’Ð㮇¥$4ß¿óÊ¿º™]%­÷¦¥D\Ûµù ð*c6ÚÀ¢_2°ŽÈ¶Ù9už§•L :É‚ü÷¿÷:ëžßŸÜžQ,ªûÉÑÿ5×ø–΋ØÙk2ü‘oºQçïK»út%u–˜úÚëõ&-&¯ c³w•úó›nkœäY[ “>?1Ûnîyú`ž±ÖâAù"¶!×ïc‘.*èŽòòÛ£e0c0U#0€  zjÿj…‚$ÍÃ&…ø¿Š70U¤³g®á(H>˜(öR8ý—0Uÿð0U  00U 0  *†H†÷  ‚D`÷’í“NèÓ^U©÷N:ôs‰—ï9ør ¸V©ûðεAWŽ&רg‚£Qt}Í¡Üðä!9•¶¡`€hL‹Ñ 8Šm&äµV¨e¢bÔá2OO~.êm±•DTÂgš)þ §/x÷1úÇ”…,PtT%”‚ÌR€ˆ#G—X'wÅ„æ{ß% l/õÇD`Œ}òÑADó‘B~G €:¦µ·d7ÛÇQwé˜ó`ÓùCà «Ö ÛÉ@µ3LçÅ;dóGDôV¦ñ­ÜP9aãM8F#„‘óò¾n±ôÃñ×ûzärz ¿€÷^þø©„á°%©@ æžýMkó4certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitAnyPolicyTest4EE.crt000066400000000000000000000016331274666402600314340ustar00rootroot000000000000000‚—0‚ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA10 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid inhibitAnyPolicy EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚£³ok¬EªÌ„lL0+H—½+_I!É©y^ÆZÕÀY²ÅûŸ`TcSÞ{[»î~c×yc£¥¤5˜eß5FéèbÍtP×Ò ãl± ®¢¬_Ó¥þ àÜö†žÁǨ“ä>™Ù€,Lô¨Ý,O^=S0Þl×n±^ HíS‹:gxx TOL:j®\äõ§4èeä²ÅúúÇ…ŠrY T¸¢ð$ç%¯H7ûªÁæŸµËЂŠ—Vž-îšv_r.æ-Ê)mM0n†xÜ£³öuþÆYçlk°`­ê% g¨¾(¨*ð„Óÿ4TH<—7y¸öVB_ɇÕF£e0c0U#0€t ÕXÙ+SÒ+°Í]qÆ¡¿C§È0U$ǰõ8ƒ~OÓ ^8gB²0Uÿð0U  00U 0  *†H†÷  ‚x[&UVöw#ƒÓ¹¶[&Tø ²W¾§4ÙòŪ!¹þ×°LÁˆ|>ž.ÿ]0õ)uIœd8Ð /¼ò™fm™u²¯®YRèí™ü »^ÖF¹v.XµàKÝqƒâOùù€¸©©ˆ'o’r‰æê\?£ÂOF½ UôS vX¤·é­ªÂ,ƒ*GrðmÇ9vï uúŠc_t¾Ó&8¶Ü0æNRu–Þ·#™ZZ=†÷’*c ’=a0aç;bÜâ-×"tÐîX^j ¹|’§ÙµH`•é±®¼´ÌÌÚÕý<1º[#"±2í0ÄMgcÚׇ«zΤcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitAnyPolicyTest5EE.crt000066400000000000000000000016351274666402600314370ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UinhibitAnyPolicy5 subsubCA0 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid inhibitAnyPolicy EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚×ÞEŒÜö*jëó_' Ö…š<6ÿL„Z2û†‡øîÿžqÙ,q yÜÉ+0Ý-p¨Ÿ€ª#®QD s²ŽF}©Üä#‘Çæê4E…J)V¸ª´Š!.xºówÒBÃ>sîÃb9¸LÏYVc¨'cz~™QÂE~®žà–M#3” ¯'¾ïbQCÁóÊÑÂY¸à,dóÞþÝ1_fyÝÚ6ó’´ßÉÛÏí¸C»ÌxáYgå&Ë|WéðõtÚwvž©Ò†”ìÝLÊKžsûë-ó¼}£ÿR ÌÇ;¢&þÞVÕ¹Ã÷_ð˜ vZŒ:´º\Ê ‹ØFlE»é»£e0c0U#0€1á?übn€eÍ©y+n‰ZèÃ0UíìÅÙ^+šNwPw~—:{o”0Uÿð0U  00U 0  *†H†÷  ‚.ûHÏä/&Œ:{̾‡ {àFä<œy“4ÎN©zħuC(%•yBmäOÕªAÍK¹«ÙÆ.d¬û`{Ô T6ÕÍþ® ¯|á×(ʳ¾Ç4¡P:•€LIûS‹Î³e¬T2b_+@Wk¥tà»3(Âs$"J„†¯Œå ²%uþ|m‚ÀÕ©‡ÅHŠ]¹gŠ]ÝW˜}ûá*¿öÂŽê5gÄ=l‡:âr÷五ÁR‘î.™>gÎùß2ÚJàh·¿ünÔ©*Ë]"ߣJ`Ï1ÍèÆ•¤Wät0Ø ŒYëX›\IHÙ†A•Šã p¡certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitAnyPolicyTest6EE.crt000066400000000000000000000016361274666402600314410ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitAnyPolicy1 subCAIAP50 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid inhibitAnyPolicy EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚Ä%YI%»»QmÃêüÊøpN^RÓÞÙ1qí{ÒX›*b-ë*/_6œå³ÊMTü19ÆN¡Þ³UåÍÐämþU{©­òprñÓ襟̇¡RŠT.(Aþ‚n1­¼ôÍ*TXRÑp!Ì´|(üÍ*„{`ÛK¸ºúCdÐ8îBÉòtµ ’NÀ+Á:wKŽ ,á„NŠÕJÖï4ˆ§dYÕÓqð›y{´)~Æ3*^Ì{e¶©r`øŒµì™yЉ4º=üÉ–”·B͹×DAª™Tl!û_neÖãóúBÜË·Ž²«°hkÇHx"obéî±B©£e0c0U#0€‰Tt`³÷n aŽû¾R&0U—ð¿›T–Qѽ!íT…ÁDÌìL0Uÿð0U  00U 0  *†H†÷  ‚Q]~ÿÀ9Ư Ut:¥0|ö>Ýdéé0ôWæÉ^;4«]X&•V»eY&í¨Ah.Ö|ìtBvGÞB4Ek†?ãä]Ttò®Ýì@å¤?øyºð:›k¶‘7ûÕÆ8òļ(myáÓHØ™ŒÂÕ²¯(ÃÞzéšIfÇÓ 4uÓSßø}«IË R¿7Öv†¥åâ v÷ŒaÃ/Ú<¤Ú!°,˜‡×ÐJ GlÄã.1ÆJ´¯²õÌ–}é… èc½¼Jš«ôü\Ã\Y¤èméM°3 (?Feöµ YáÖ¼½îÜö¢¬r¦‡èŽO .„ëìÂÛ+‰Ócertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitPolicyMappingTest1EE.crt000066400000000000000000000016661274666402600323030ustar00rootroot000000000000000‚²0‚š 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping0 subCA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid inhibitPolicyMapping EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚ÍІ‘³•¶â>E L¹ß«k®·­¬Ž°G¥y¾ÿ@ä€ÛŒý×èÆ/J|i÷ª £¨âêHX¬+QÿäŠ"êÒó;‡øÜaè‘g]ˆnÔkÏñ)áÿ¹ÝÿÍ8€ô,["yîˆÿ¨t‹M¯'ë”ö¡ïUÅ“’{,Ьh ™ Ûy´´ýQñ’:ûåÄE^@f³ ßö kæßÜ™»ó4»m臎¯ »7¨hDIÖ†%v›äöØ‹øÆ•##KÝùŽŠKV@å›uÍWØy(&ñ[k’Øç˜y@8Í×LAQRMõk>B×ÃàäÑ ÃÌÃAx}k¯£y0w0U#0€ÿ´sbR\–:Z®¼¸,‡äÞšltLÎÏ’Î4P\çŒ4²üë' ”|bm€òÒƒvßÉff€#¿“ZTÃûMÊ3+9h¯acvÀ2ó8ƒàhüÚ 0›ÜšYGˆ,A»Ä9½B™#óP&ÿhÃ&þLyª½Ñ6áþ?HŠÙ(UûQB\l_ Äš±øÃ n>дLåéXðH•ÙG`´"=Â8φäX-"Ï&Y03UÛœ“²ÿ¶Õ´Ñ@XÉhÞ“ÁÄéàäL‘oWð97ØÎ¢Ÿ K¬XÒPúÃú‡ÁéMz‘zZÿvÒoBé¯?tF^iÈZ(&Ö‚h, YZÑcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitPolicyMappingTest3EE.crt000066400000000000000000000016571274666402600323050ustar00rootroot000000000000000‚«0‚“ 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"inhibitPolicyMapping1 P12 subsubCA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid inhibitPolicyMapping EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚¿a AYA+²¸·ã§îtH¡q¤ ×”×¥Ÿ°[Òa÷¢ë÷»b.¯AžwU¨VîŒy|1š?â]£Šdÿ-`Ú·õ]Þ&9®_÷Ñnu“»ó¢1ñF.§\Ïrêx‚¹8àäc"hu8 C@•éMWª,wã.7,d’ç:'¹ÉwR…Ö‰\æpæ#qÆF¨ ¢¥œèxQwXÔ‡à?läÎ<7:Ñðò —wïö©Ìû@Ré†@Õä×{—Â4œÛmqÓ  äüwpjxN9!Ñoâö«…HÜö•ÀšzĤ+á~Ù 7µ Ö¿oô…UèÉýg ‹Ä½:>Ý|FÇüÈ#–¿ÒcBÚ¹ÏW†ýv¹fÅXÅ? £UÓ+„¼L§O==Ÿ¼½ë\²øcjf¸Í°}ýÁ¸]+Dc™"]ƒ¯€ð}Ò±VYn¤_,Él3N>,Q‘T:•j”4³ú£2L becÐO±qZahÆåþ /0w}8‹aééïá§ê-ø‚rJžò"“ÒÞ`‰ßhÔ¾Í4‚(AQ|­¾a}˜9­Ç€ô‚¿Èm:ÉŸ\fZË~aúïþßd"ò»:š}Řê†NòÌcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitPolicyMappingTest5EE.crt000066400000000000000000000016561274666402600323060ustar00rootroot000000000000000‚ª0‚’ 0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!inhibitPolicyMapping5 subsubsubCA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid inhibitPolicyMapping EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚´‹wéùwÙ=A½ $êÿê9®¦Ã_©Dv9[±º\¨ ž*(¨p¤šà]ü’Œ%ÂP r¤´YöÿèÙø™¹UeLCÓy¨I ií#»Êÿ«Ú¾Øç1ÌX®»Jˆ‡og ЉÖ‡â®zŠü£>bq9´öܤûþpÇTˆ~¾D>@ým±ÖãD¯9BüµmBQ âÖÞÒ¢ébÍ5ÝD Ñÿ4»‘BØ3È`)~+€ÙEÍÉð6ÖÃǰ@„ÞൂÓ<9àÇ·9ªvôI¦°ƒÝWÉx;nžp: sç"Û Ù¹E‚°<âå3™ÿ½K]QÌ¡£k0i0U#0€®cË×âÃqãôÎnü5ô›ÒM>Ü0U •N-óE ›Á¼îéë[­QŸ0Uÿð0U 00  `†He00  *†H†÷  ‚.l×R°. áp@æ¯Cïx-¸ä:2üÊk]„‡î” @Éhµ"ª’â)…ÒA¿kø= l|€,>"€ÇHÀï ï6[ ¯y(i³½´¥ Æ#¤ú—²¶N­˜ØX]ÉI(ÈAUÍh3šFnÐ'D?°E| L¤S2ªõú¤U,k=Ñ,ZGA Îo´×)!¹‰yØíë<|ÜuÄä*üT*íåk­¼KŠ ¯ò³(ª#Ô&Å©ç\Ñà $}2ï—C³ÜS¯Â>ÐÀdJ>·JóôÁøn&A<0`ªÂçCWÔÔšê¡ÕGißÚy]B=gÓK2sþ¶certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidinhibitPolicyMappingTest6EE.crt000066400000000000000000000016631274666402600323050ustar00rootroot000000000000000‚¯0‚— 0  *†H†÷  0_1 0 UUS10U Test Certificates 20111/0-U&inhibitPolicyMapping1 P12 subsubCAIPM50 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid inhibitPolicyMapping EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚Òô\OúA’Ëcøäº‰6ê¶<òúy RxA÷`¾BÀüý ›‰éãRíºD›DbÖÁSßÀÞ®Y”oeÈøHìa! ½b¸Z¼ ¶ •ÀcDÞ[|â|ÜÑT²¾CjíͶ<ŠN AÐ}B?&3H:;Ø#zˆdÅêR°/«¾r0ѱîÂÝÂÐ8Í–dß9¢ób¸G'ÐgâÁG„‘Âø˜ß/[Ë¿€.èà¼^Z³ÉY('Ú1T—.ûÖ_›ƒž{ЛG~ÿ$×÷ÛÇ%Àr« SX)ØÃsëò(m;ÝH¿[ÐR6ð¦0§Ô+n7ŠxêÝ£k0i0U#0€‡5g𼡠6º¨)í›[p0U“œïv ¯¹-fR"xK±Gû±ª0Uÿð0U 00  `†He00  *†H†÷  ‚¥ Á1¯ÝÙ®e³’Ò7€UFÝ+` ãStNÏРùhM½‡‰ÒsvÐŽËï1ËÉôö­‘nPëcªiß—°;ø4„è—£7ÔçVó ÞÍ·6ïk@º@6*¦£öxïÚƒ^»•å »›_û³ÿÀÇÏÅmVD]-Ê“*k–ßËnÔi×°jøBÏ<)2ÅÜ3'Lø5äëÿÑ!- ž:ÁÜ»W€ûjŽ{]îWjOPyzÙ¯€+lq™©ý>½ÀP¿5’ϰRAŸ0”Ùý.Ëÿ•ñØ!F§DîóÑQ-£X~â‹^0ÒYê'vÓŸ¾T铺!ÞˆL¡)certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt000066400000000000000000000016721274666402600336060ustar00rootroot000000000000000‚¶0‚ž 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"keyUsage Critical cRLSign False CA0 100101083000Z 301231083000Z0u1 0 UUS10U Test Certificates 20111E0CUÔ˜áT¤ÈaÇìÇÓRöPŠZ°Û"0Uÿð0U 00  `†He00  *†H†÷  ‚b†Gä(á'è¢I‰{Ò"¬°ë™N8»ë—ñ_±xÏدwÝKçvtüÌÁ> í®Äƒ> ¸ÒáºÿÈzb)ß–"Úòû&k_Ü4ÔÈ™¤ÂÉ»]£ìüØõÏóêi®»eØQNÙ@MWä¯å´É!¯—¨·¦Ò ‡/y$Yq@W%”Eäñwæ{s DÓ†UÞ ·•¾©[$$i[ݱXxt5’q[Ì.Py©¯´‹Vsœ^«·r= #PMQ÷ òˆj«ÀÚ_¥Æ’$/eœµß‚ý8¯Ï#ûtÅ“«dg ý)£k0i0U#0€4U gü±ÜÂr ðcéÔ›ðcù0U„$âº×Wò®Õœµ(*d0Uÿð0U 00  `†He00  *†H†÷  ‚™£­c´T椽 æª,ôª¥’ 3X¶5*~2riß2h¯d§Èð“) H­€¸¢Ÿ ³¢Å+éÒæÀ¹ ®PyW›æ5UJ¨Œ?¯7dˆÛõ·Ñu"LÛþóµÓÍõzì¼x¹8r·GwG©ET9‹D´üž6•½$õ´G¡ãæŸZ œ˜Y@XÜÎ6Êú=\| 0Ü“=4¶¸LH$bÕºuŠÒI:ǟˆ!øEÕÀ“à'÷Åå”§á¬;—yâ/q‘„3t¯†¼Ñœ¸l$¸Ú/ªš»üÆ”ýÔinoE#ðWsÉ}–ï¾¹®m9•?и`)MŸŠ" InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt000066400000000000000000000017021274666402600342030ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚¾0‚¦ 0  *†H†÷  0_1 0 UUS10U Test Certificates 20111/0-U&keyUsage Not Critical cRLSign False CA0 100101083000Z 301231083000Z0y1 0 UUS10U Test Certificates 20111I0GU@Invalid keyUsage Not Critical cRLSign False EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚¾¤cÙÎð+ÉØøÀaÞ¯Þ— ¼øÊ¸‹‰ŽLIsZééÿü§¿Q­Z<,‘ˆj'Á÷<­–ÿ™Ô~ªSL˜Ùƒ(Û¦—÷z‘¬’/½¿Õ‰í2»­Ï­¢È4… Îy2˜+·ƒŸ…Wlh° tp«-FïpNAm¬±èØŒÌb뿱–Oüﺻ‘±¨O·eh8JÐêÕL¯ ¿Ç„HÜkŽ?²»íó/Ý#x£áŸ’G§ '`NX­û§ÈyD •[X²ñ\rQô°%˜Ä9ù+¥ÑeŸ¸8ø(æm+¯º†T)>ãÓÁÚ¯.À€ o£k0i0U#0€ù~R yfDeyÝæCñØ0UÿÎ2²{óVßvò S°6³f·Ú0Uÿð0U 00  `†He00  *†H†÷  ‚‹èÙ·|-zeØxF˜\k‘:£(ù–¦™õ!þÂ/,³’~:+öò¶aZ˜.y÷ÉÏJ½Á .i¿!·Ò5eÈ~ÅÓÄj­¤3u¾ÿ¾ê ‹dÇÄ8,UÞ»Vk þèùÜù€¡bÅzV@KG‰hò“¾­?éK„D6[v†vN„Ýv3€ 2±ÆÍàbâó sգ،žó›Bñ‹ÁM´šc-çå¬GÁÙ¾%æ:|¡ŠFÿ¥¶¹°¸E›ééVhg‡Œhb#nÏhèì„ì±.GÙbÂ[̬w‹«uþ{u £eÞ"g;×hwÑ+^²õÏd_©×yC¹¬¬“InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt000066400000000000000000000017031274666402600351270ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚¿0‚§ 0  *†H†÷  0c1 0 UUS10U Test Certificates 20111301U*keyUsage Not Critical keyCertSign False CA0 100101083000Z 301231083000Z0v1 0 UUS10U Test Certificates 20111F0DU=Invalid keyUsage Not Critical keyCertSign False EE Cert Test20‚"0  *†H†÷ ‚0‚ ‚œð3mmOXi¼G…ªG$q:ñT¿Á!=áÆÜ³âÛ$ºÝô§P˜l*Ãô¢2Ÿ¯ì©T1F/ͰƒÍÚVL?Žð«ÇÚ‹‰6©c PáŠ.ñ8âº}2ûrýv#%¦ÇëÇfRt3¾Y·‡¡Hè½ß³íE:Lx¬ý²ˆò‚ >”ŽƒoV@ ò,0ö4’ÿk^–¨­Øû¤¹ÖEÓ® ×¹Hu^º§1ŠÁœeþþn¸vš£,C^¢Ì²’µ®[û0GGˆB^}xËÆ§µ¤¹ÐõwÖe2+Ù™üüzW@ËÒ‹d]HCŸÑŸ¥£k0i0U#0€²%Ò(0ÐUhnLµÂHóÊ›ò@E0Uó²NÕÉ\¹Wd ¶åÿï­Š·d0Uÿð0U 00  `†He00  *†H†÷  ‚xxYµŽA çvÍ %Î¥­•ˆðìXÝ>¶º¿1£/Ñ%n!fQ‚HCY+“}óbë0´p…ÎøÈ”à=¤üýyÇôTb‚–e{)|ýc1ôG„c:Rð^è²Ù‡Éóx¸±vwß§Éj~(yB0lÐĸ>Õî» ôR½Å]ü—BB«7‹(ˆ|;Øh «ëm— — 3xÁ§?•–Dªh»Ë*×ÛØtûG©êÖ¦8.­FþÆÏƒ†´ò–²Ùt×÷ócªëHWÑ:‚³Ë‚_™xêùØÁàÎ8ý×_,qæ}]p˜ÄÙ‘\ó[ý ¸*â®óÙ ܘM/ì¢certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidonlyContainsAttributeCertsTest14EE.crt000066400000000000000000000016611274666402600336050ustar00rootroot000000000000000‚­0‚• 0  *†H†÷  0V1 0 UUS10U Test Certificates 20111&0$UonlyContainsAttributeCerts CA0 100101083000Z 301231083000Z0q1 0 UUS10U Test Certificates 20111A0?U8Invalid onlyContainsAttirubteCerts EE Certificate Test140‚"0  *†H†÷ ‚0‚ ‚®¤o™@Vµøw¼¢ Ò&P¦¼n¥~'ðˆ#—#™7Ë® c3±”þ4…ãqË™Hò$§ÓbF¨&l«ÍZ‹N9ЦQ(Kž‚ü­c}8•JÁ¤rÞ)ö‘…Š<è‘_ ‘çÏà‚1nÙn•Wþ®I­(Ñ!¬4kŒu3a6Czv˜eü’»O[ D—ë7¡€6(ý¾y„©Vk^×ÙÅ­áYÅ~Ç¢v˜@–2´(™2Æz/ –Ð1 V"ÐèGÿEÐtâ/~v=‹êá£'xÊ¢9hgË91{oã¨wO:M%qå“…O£k0i0U#0€Mþö-¼µPMß™zm3pN0UÿÑA4 A¾¥Nå$‡Ö¹¯Ã¾Íë0Uÿð0U 00  `†He00  *†H†÷  ‚Ž>J˜²È²A]މuË4þ¡á`"£Pk°HÍ1Wë¢ÿ]Qã_jM™CyQ$RqzÃ1ÚØºïìP¹ÆqnxéÄ«ŠvÒ"rÞ䑘ð†äÎàgëY‰ }ðÔ<ÇŽ[G Sˆ~ÍÙ"íž@-'Q…1]pˆù·¯kñƒ6cðÃu×F‚ÜNÎp'\îhQ/ >Ø^³×¿iÝ?-cÙ—œCSóµÒå[uËÜ!qõ2Oa5¿.6L†ùãà4nþWC\娤)Ÿ°„Ö‚*fš@`;V÷BF®üÐýs)1l¥ V£†j4å™¶¸í«CT(Ë;V¤½wšö1i7CñTcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidonlyContainsCACertsTest12EE.crt000066400000000000000000000016431274666402600321230ustar00rootroot000000000000000‚Ÿ0‚‡ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UonlyContainsCACerts CA0 100101083000Z 301231083000Z0j1 0 UUS10U Test Certificates 20111:08U1Invalid onlyContainsCACerts EE Certificate Test120‚"0  *†H†÷ ‚0‚ ‚Ïþ Ó3hÍFYêà䮡;ïr¥j„퉩ûÙp$?îÛR¾ë»¬$ayœ_ñ2hßÜ݃4b^˜É Hº¼w¯ì”íLék× b„Ûj«\.f=‹šTªFVjp÷6ÂÇ%. ›OŒü›úµ=Ås»ú‹LSv½ ø›»¦vD†̯h«0L•#[FJùÐ%gñâí¸·#e‰Ä¦‰£ õ«Ç˜>¬nŸc)ÐU/jѺê—Ìs*ïG_N_“ÓMOâÔÙÅ£±ôøUyé’ý½9³É[†‡üØ0%@]ü‚ HÇŒ52¬µÀ`xž70HQ ³¬ì¸ÚZÎäöeñÚJ_2ôšjÖ Fã1Öiº¡º:$«+ïà٤ؘÜ#±Îë‘*°ÜãêµÃdy9g·É®áçZ±Š/«Lîèqt$¶1ªü3£+×—­û(“òÕ»?Fcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidonlySomeReasonsTest16EE.crt000066400000000000000000000016341274666402600314020ustar00rootroot000000000000000‚˜0‚€ 0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA10 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid onlySomeReasons EE Certificate Test160‚"0  *†H†÷ ‚0‚ ‚ªð¨¯†´¹˜±N–·Š‘“Š=/°lÛ8 ÖÌW\sÆôrWê‰.?²ü‡‡EkÈpV˜t] [‘²è8äÎ`¤ã ÛýG´HŒŽVÆ¿×t0nÌ,óºj)½JZ Î Q~r,À O–f? M>X½¡lÀÂ9ÇìÂ-¬HÁà•Š³¸&ü¯‰ò6䟑µ²TžGÍMhôIÒ”E” S ¹¹®Á×ÙÎb t'LaQ¸Tpiecù}¬Þn5:ñ1ÓÕί†æ#Å«ûw¯½±¹bˆ›?lJÆFŒÝ2/¢ŒÂð0\_k‰œ€#ν ¼ú®D5†wï×ôwk£k0i0U#0€PhÑ A'‡ç N·xVûŽîq0U©™#bÒçûpA–ÀOM‡Pžcd0Uÿð0U 00  `†He00  *†H†÷  ‚q ŸÑL<þ&Q°©§k6•š¡‚+e%÷ÉU ±hÿR–°ÿpœÛßcINŒ=þ We £f‚j"ú/\1ù®=ð«Ãìbˆ<ÒÂ_ hR®†Õø'ê\È䢹4·8šS%õçKÿî¼P÷<‚û“ËéÆfQvLÜtº¿_CFÄs¨‰ÑÌRòTC§^!=ßKÓ>H{Ø8M@I›0ààB<‹o!àÎNgO”“¼>xHG‡Ì‡ :{íS1¸s`,'‘«iÒ|°Z"qU&¾X3ÿÜ£")C%N°‚‰¤ˆ°tt† ®î¦@¶PÅP“certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidonlySomeReasonsTest17EE.crt000066400000000000000000000016341274666402600314030ustar00rootroot000000000000000‚˜0‚€ 0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA20 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid onlySomeReasons EE Certificate Test170‚"0  *†H†÷ ‚0‚ ‚Élr´×#Ýå>=eÚc%Ž•Eƒn´CîÄÊ! ËK[³-Z&QöƒáŽœö»ý8bŠ2¿’€È£ý ‰=‹øŒ F ükp\¾ƒßpÈ® ûÎñ¦!~µ¡ –·iž€C/ú&“ ìV;ÂÖ6„SXžÌZ[5g.½`IFÚ´Õì¬x9ÛgdbšËdîgcT¸Y«CuM•2 6É,`Ü\| ÷E²ü}'g¾Ù9iÖUÞw ªûöÒÿ‡Iúh¿> ¢Q˜®¼« 9ÿ’­—SO£éŽïV#L SîyÜ¿Ýï‰)î¿d\Ää ‘ž‡%‡–:o—£k0i0U#0€`cßÒ#¤)ÖA¤¬Ê†y˜¦eH®0UsGíëûGêÔü©uÇÛŠc0Uÿð0U 00  `†He00  *†H†÷  ‚ÚS³JhÚ-c1 lsqýÆè ¦šöu±P'Ç‹GçÞ•JÙŽkIÓôã3y–€«cè ¼þ!¸«èj—oL´ðT(ñ\¢-ãר$ü»²„®û`ÈP¸È}ñ)OµK?G4÷ÜÇ`­v%Z0ZpâM RYòò¡ó`ojT•ØWe€žÿ~3>_>;#zÏ—²g‘Õ!ÔµhQÜG¢^ÓÅ‹ëq>š”Ã-¹ 7?ä"e^þâL„/ß;6ÕÞ¿êò{ ‡ÔœÊØ5Ÿ¥”YIŽjK÷ºKéxø"÷ý8â…#iuæÎä0M66'—?sÁýPcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidonlySomeReasonsTest20EE.crt000066400000000000000000000022011274666402600313640ustar00rootroot000000000000000‚}0‚e 0  *†H†÷  0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA40 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid onlySomeReasons EE Certificate Test200‚"0  *†H†÷ ‚0‚ ‚âDËDÙNº2p Y®C›¡3 ÛãÍ·äÇ„=-Ε"ñÍHa¬œû33)nm+NùZˆW†ÿ¬Ù*‰Ú¬y‡Ã œ×ˆd™SÕ…OO,gü?ÍDê±òmŸR¶KžX“ ×UÛëIQ2x:n°\¦“_Â¥n’ºÀjêìz–ŒÄÎ!\á0~µöÏ‚>ŸÏ"œÛO7§bR kƒÆ¶   u=ðû¸6QÒA˜ ¡)4q伃„›`¿tI1ï¢VØÇÖ)âíQ¤Uô¨B´’‚VÆ\M0· IÃë™ð5GLëq=+ºÈåOÔ@ùÈœôƒA­LíäÎFÞx*GZïÈè0ß ë°¸²D[ЈCf¨certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidonlySomeReasonsTest21EE.crt000066400000000000000000000022011274666402600313650ustar00rootroot000000000000000‚}0‚e 0  *†H†÷  0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA40 100101083000Z 301231083000Z0f1 0 UUS10U Test Certificates 20111604U-Invalid onlySomeReasons EE Certificate Test210‚"0  *†H†÷ ‚0‚ ‚è­/óΛ&Ï´†@,sb žì÷iLšì«Â˧ªû8ùáU«8$_Mô4ÛpWÁ§_r~Ù¾ü&_§ Ë˲†X¢²óááo{à¡s:’é‘â8˜©_Z¹7¼˜¨ÐfïCèCO¨V‰K‚ è .Ñg<±Ï½Ð.=a`šÅö %¢}ÑRh`Æ(Û¤öÕ2®Š—qÆ —  o¥€»:8žqËØ.êà1'^)}›òÆÌñC`Ìs7ÓB©…iÑbpœÍÉÑo™ |`ôUáéÿ€²©CÏ3•¢)tiuån[j‘,‘;³dž´F)£‚N0‚J0U#0€¾fÜ ;öÓˆ4‘S& hnÉ0U'7eïéÜö‘Á=ëš©züiº%0Uÿð0U 00  `†He00ÞUÖ0Ó0g a _¤]0[1 0 UUS10U Test Certificates 201110U onlySomeReasons CA41 0 UCRL1`0h a _¤]0[1 0 UUS10U Test Certificates 201110U onlySomeReasons CA41 0 UCRL2Ÿ€0  *†H†÷  ‚-ž³ÿ„«çÜŒ $ãg8þ¿ +EY–>u½cf죞\S#jeuœÎ1!üxG1êïRªO r6ô½æ*Ì€ï’_Q†(¨µ÷¸k!*Fu@ˆp¼toýŽÇ-tÁÉ R¥CA|FÏë“èyvö§UuÕ6<Ç ?J|èoUÓ‰”¡® wJ«|˜¿ÿ|þšÌ ~™à…“ç ñ¥¡éš T5Ë^ {­ 0-³P ŠYƒW·-MÏŽŸó=ÑÀ( ôié2ácertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidpathLenConstraintTest10EE.crt000066400000000000000000000016711274666402600316750ustar00rootroot000000000000000‚µ0‚ 0  *†H†÷  0V1 0 UUS10U Test Certificates 20111&0$UpathLenConstraint6 subsubCA000 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Invalid pathLenConstraint EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚—ªò_Ñ&íËV"†{<| Éå”Ðú)JÄ9·ßØÄOœÞƒsÃ$ׇIäÓšÜÀ°ªK%Æn¢YgáÞ» O³[(ùG¢Á´û+a¸'g¿÷Ç|EVô”¸Mëß]‰fø÷¼ÐÕD5*rààbRç6\È–’Ó•þÉܼøÙ8xg-"]Xd¯¿Šÿê¦ÐøË²°¡ù<X4×:k'”¯jŒ\ös·(fõ»Óg öÓy3õszñ.e1cArv]ÿϾ! oÁürä´#˜(eš…Ö#ˆƒ.<23¥è ! ¯ÞÓtbÑ$œuÎäÖVZ£|0z0U#0€º¹âˆ÷ÔY%Šã)ßO 8Ýqt‚0UØÄ“û@æô&|#Я®zÓ0U 00  `†He00Uÿ0ÿ0Uÿö0  *†H†÷  ‚õ« bÇqI|…P¤$:dŠ9+YÝú¨c,ož)ßì¶Ê®éÿJQG|6Û!ÎCjV8‘ée‘iAÍñ·HcÜ9[à‡« \Õ¶ÁZNæþÒ³‰GÜÅÓî£ÐœKµœ´à Mö8u K4æ¥c¼üÈ$8uÞªºñ©bg”•F…²­%$í—mÇÚÃ0ö"¿k)þ êV磆+`Oü¾_ÈlN00#µMïø5/#ÛñYF»¦‡ɽO;?ø©ŸRhúq™ó!„S)}s Kž»w¢mÿ%Öv­Ï†0U´´µs>Ó†ÆÏåíãåÀ­ÛaêKÑS+’öÁpuT–3{i}-y9÷GHº™1)¾£ÅPRQF³q`ŽQÛ¾ô¡\œå±F‡÷ Íê-ÜNšßŒ+9Éx, YùCËmÁNfœE­­¥„G˜ÌU $ëÓ}oÞ`¥;¿3çÉÎØ½ÁT`ì{0P˜üCHåÀÖΨ0?t¬\¿g=#W·R“OkbšÉx ßH3˜î„73V|†tƒ¤Íôê¼+éaGÄë£k0i0U#0€ƒÚ¸µÆÈ‹|‹?ír%â¯ê0U9Wùmû·Y£:/±t8Û¹§0Uÿð0U 00  `†He00  *†H†÷  ‚¤GUçÔk„HŽ}Uéˆ&9šæŒ»V½R³~°øÆ;:¢yÍÖ#“äýÀÖrßÅ“õþ‹½ù[<Ø×R¸*²ÜÔ5d~´òDòÇ E™®`ÒžNQ@ï¡ü£æ 2æ/ßíåðka¢rVêj –>¾k?å‰8‚.¹J“Œ9â7Å—ê»Gá}dËɱÆæÌGör„‹°ÍÕ»·0YYüÌÏm„œ@l¤Œpޱõv%RJ,t2½”TˆëÉ‹‹˜¿k8e-½ˆû r)"\®¾)Óé HWZü}Mº÷à'^sMð ÏëèO'J°)Z¦æ¢Dñ¾¬ÂXQ¢`hcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidpathLenConstraintTest12EE.crt000066400000000000000000000016751274666402600317030ustar00rootroot000000000000000‚¹0‚¡ 0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!pathLenConstraint6 subsubsubCA11X0 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Invalid pathLenConstraint EE Certificate Test120‚"0  *†H†÷ ‚0‚ ‚™Ym³sx¸soîQŽO‹h_­°ûÝÖëâEϪ!Ñéî¦M8ÕtL*ö*ße+Ó´ÍHµ!®²þŠ(*èV ŸͳÄD¡v£/zXxᵨUÁéC#Ê:å…F<®b„Åy¤(®d†ë(Nô˜-²gÎ $£-)nò+à2( Ô$þn幬٠n|s2y/¨—M/ç*&v.ûàA~Ù5=@u¿Ùaúqè€s Ëô…× ‚A‡Ê}I%RÜÜ© ¨8%F)ÜfŽ‚hêË'æ¥Ê¥ñf%mJp8rã`}·y*ÿ$W¥¯ò¨'ά™›£|0z0U#0€ƒÚ¸µÆÈ‹|‹?ír%â¯ê0Uö<= #ÀdŒ>3¦C ¬`»³0U 00  `†He00Uÿ0ÿ0Uÿö0  *†H†÷  ‚’E"k&ñ—´ÅMS/^ÑWc÷º0Ž }˱*w\}ô4(¬J¢­GÞ;\9™…ê˜Jd“>®«½lŠRÇÌpŸˆ\”¨…B&{q¶Š){…;0Þëú:C–º*);1ÿÐJÎL³G>? ñì Â,`õ:žÉBâk¦ u5¬2qcŠƒDE¤çïg¿Œ^ˆ¤«Õ.ƒÛE¦)Ö¼\嵬ýbœK-æ«Ë¬ü¯/ŽE®·Œ#‰ßži¬1 »Mr¦—GkÞ´85ihE)Øfpà"®À¸ÂË’å]!LæÈeÝÔâŠÕM¤`™÷Z…Éœt"Ù?ˆ·¿°Øj7‡*CL$‘™Qâdð O¢"{2ƒVÁ.â¦YÙã|»/Y¸¨pNƒh·vw`»,Ú†h’{(8skF ¬UÏ<Ä6³”艸!ˆ”Sážïí`Ù­9¢‚4¾B“£k0i0U#0€bg}Ò7ÅrÐ޵ʣs^0U§#ÁzÄ=¥ƒðª )ëâjãÏt€0Uÿð0U 00  `†He00  *†H†÷  ‚çÉ8)U]…i¤Èâ‘`eBÜ©Ã#s¬7dI¾{Åœñ^·'ìßôÀb‹bïÃSiK¬~ºÕµà ‡(\䇙<ÚÆ8½bt(ô1îCÖj@õÚ}ÈçÉ;¶-7¾Ñ«4F=ÖJÂæ¢n΃xcñâ¡V€ýaB΀þF®Ö©¦àQUc£ ËS4¦á§j+Üt¤l`À\.c¹Ž + '-J[ A6šBîº!ÒÐbïK úLþ_Œé̓–Cò7*óñŒ*ZSÕC¨—ðì¨q l̪~-fø5g‰¦#¹½ ·hà­ÞÂÈZ=R°ÞßÛÐ(!certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidpathLenConstraintTest6EE.crt000066400000000000000000000016631274666402600316230ustar00rootroot000000000000000‚¯0‚— 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint0 subCA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid pathLenConstraint EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚Æ Þ›¹5Žk¾–•S 7/ M’³M=ì)v¦Óû‘™q¯'‡šO´(8‹ µ^ÙÝ·qPÁ]Ä·Ÿddí­ åÚ3Yí.ì>ò=œAN¤î’ÖÒ‘=5vþ|@×z@¨þchÉ+ÀŸo2‰ñØú²#¾áNÓü„|Žã&i KLë`þÄÓµm‡ˆÀ¯-³ß\à_ÍH‰ KÈ鄆Ë^Ƀ×–áꌗPÒErcʸò·g™ïóÉ©Øs0Ò¨Ê 2Fˆ3ˆƒåµ\¦tvi% Ÿ\­þQÆ7 \ã4$‡ v êÖƒæ¯àMü3 Å Nm Wò££|0z0U#0€bg}Ò7ÅrÐ޵ʣs^0Uý‰éN¡¿„¿¤ÔBæ¬Ã¼'0U 00  `†He00Uÿ0ÿ0Uÿö0  *†H†÷  ‚ˆ„k¾ œ)ÏV51gM¤±:aPKxÍ ‚Á-x-·º[yÉJ•öñ‚ÌZC+-†vçWêGºÆÕmaÕýAˆ¡Àð𨠷¡ ºõ» 2a’i½¿Qãr•hˆ;€·«b¸XÍ|M8WUåÝuL|VÌóªC¡‡…4>àq‡Â«mÏDÜ‘µÆZD4¸û£ƒÿÄ*¹ RJŸd™ãnø²Ô åGž&’âöøòM–J€‰ÊØ!8ΔY”íG«Ý…î´\fî]qÏïd‹[‰Ð]ÈßM¿kÞ'BlÅÚ`ÕY?*DwA¶kË8ïé ¡¹•åO§¿†e¿bƒ±î(certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidpathLenConstraintTest9EE.crt000066400000000000000000000016471274666402600316300ustar00rootroot000000000000000‚£0‚‹ 0  *†H†÷  0V1 0 UUS10U Test Certificates 20111&0$UpathLenConstraint6 subsubCA000 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Invalid pathLenConstraint EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚ÒÆoš×=ÑÕªÞwɯ\0Ë0`Q'¾Æ¿Z½ÓšA„öZŠ«, F°Åç‚G[®/Wø»w 4N\¤4q®ŽJMÅ3þ´´ãÍ"Pæ±s#|*b(½ðÀ¦ß£/Ë“a<`޹ 煮¬¼«UàS­û9EeXœTB‰¾¿n¯À@€<©ó¥1³º4ºh&ÐÝJNb…3*ö™ú(>t,ÞðêçÅíßK£kž{ËX¤ôÍð"7«`Öj#yÔ”îV·›IÎïæ<=­ ê&¿FfXõZ ·kO³lxâ-…P™u\ÉûìºÐÍq®Ç5X ¨ä¦L©èåœàyTìÕóEk½£k0i0U#0€º¹âˆ÷ÔY%Šã)ßO 8Ýqt‚0Uy#Æ" õÿ„H8Ÿúb‰Û„"ùR0Uÿð0U 00  `†He00  *†H†÷  ‚PÔ­Ì}®­h+¶’*UN8`'ùDÀ%º,þéø>bD–l™zWŒ7aÁƒ—%qóP\Þ¼’.ïåAö›ž­pµbZ"ûâ$ª¿ ?*mKÐv‘ÖÞod_÷GäÜË·ÕZȶħ¥?‡DYcÊ$gùcÐ5âmÛÔ³Êïúu‘ôõɽÿq;f–!»Ã7±ç&+œsÒ*Ù¯,.Ÿl–B)³˜>–2h€r„˜ÝœZ /»ZmåÐàa»,‘¡—®3 ä þ *‚lDÝB›½4Õ£>F)˜¹ñEñh§Ú%7ɃÏz--a¶FÕ€:¸T'a=|certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/Invalidpre2000CRLnextUpdateTest12EE.crt000066400000000000000000000016511274666402600317300ustar00rootroot000000000000000‚¥0‚ 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 Upre2000 CRL nextUpdate CA0 100101083000Z 301231083000Z0m1 0 UUS10U Test Certificates 20111=0;U4Invalid pre2000 CRL nextUpdate EE Certificate Test120‚"0  *†H†÷ ‚0‚ ‚É‚ gN'7ïýÄ eŒ=pälD*0ò[x—gKÔÅO§[Ƕʪá>ÈÏH•.íÆø×&àh⤬ÖÒ)Dõ6§ÃÀPRÑ_¹iapŒÂ?r‡îôHɪ”Ò7¤]Àº_`ÔÓ'SþtW-0x,ãŒg©ÁN—Ô|Sw…ã&E£Ñu§âà33 oEh€¢œï9ž% ¡¯?aN ðisŠ—$Nj|ÿ“ +QË€I_>à«XSle‰nxÎA)ëoBÄ 2pùKo×Ùg¸ºp·Ó‚Ð8oèhÀiN7«‹Zc‡èðC{Mm³Æ0ø§°»Y,ѶÌÒ‘}®Õ£k0i0U#0€¨Gœa€h(±Bš)Œæ()’Ì0U(,ŽQü·œˆ*kî,k?ø{by„0Uÿð0U 00  `†He00  *†H†÷  ‚¥Ô à‘ú™_𸅖a¥¹˜û$ÍžÕŽ(ÙúZ_N1¼Ã':8DéZk°&övxÏÖ6&©LI$a3 k—Üa¸ùŒõ]£‰Áïý §ßKéB09u*9õäíSª"u“¾eWá€<(î¶ÔÓþ[f˜í]Ú•-Îýa!ä¹c3.~rSnÛôÚ/’cNHN#tm6ˆù´§DK|ÃѦoëwGPÔ!éу£T6¯œ[Æ0>ÊÞ5ÄÉè—xýaí/…_C ˜7c”OHA^ßlâDu/ôÑôñŸf|hA£’U®°×æwn"èf=˜ÌDÝr:Êl{¹I ûU$ibTë»certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt000066400000000000000000000016361274666402600323430ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 19970101120100Z 990101120100Z0r1 0 UUS10U Test Certificates 20111B0@U9Invalid pre2000 UTC EE notAfter Date EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚Ÿ$ç ÄïÂS¡É—1oß”bã^Ë«á¹0Ð@fò´k™)„ßí†!;¶0Åò:Ñ8`àeBÆl=DŽ ›Ú^,Ú¶Çí^Pô\Ç÷ECŒÊ¡{È!e¹»+5¦‚Œ©uC/ ñƒ|¬/i—üÎFjˆÞ†æzÚmDPtw¾#ë&qT±;Ó4b¬±ËN™ G›Xù›m쟬1Îpþ•ðx)-'n•¬ÐÐB°Œ7fY.ýÂ,‡‘0ü$ä’Ç tsÚ_1y_¸,¸Àglb0tb#âèºðš©T_— ëO=W|¼×Ý) Þø.-¸“£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0UÕ…žS0&Gˆ–~O#“d”ó¯0Uÿð0U 00  `†He00  *†H†÷  ‚‹(šÇú& <Ä›+ô‡›—ˆÚìÂ9¼ƒ‘¶ýG®Å°¯}I·Ç[ØnÜ·Ñ §ëX$À8v±ÔÕÂó„ÿ­56º¨ÌO:dâ–-‚;ÁIÌ| ÓL-9‚“F‡HUžc û n]û¡u„åÏ:5éfjò W<ðK3› ¨~½¬mhµé¾³íp o&î~!¯Þö;üÑ3BÖ6îŸí¬RËè)!¬Ý^¬óKÕcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidrequireExplicitPolicyTest3EE.crt000066400000000000000000000016271274666402600325160ustar00rootroot000000000000000‚“0‚{ 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy4 subsubsubCA0 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Invalid requireExplicitPolicy EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚ÑéGö!,û.HTþB7R ¯vª÷ó Ù!•?MÓ“M·­µ‘?„ÐE%‰¼ö{^(vÿtA‹´ m­}5ªzÁYjóYƒÕÀºLÅ9 sü±tºÅ’T‹Eàd^óÒ'ÃdÞyÏÛÛÉÉ.Z…õÍzÞIŽUpí`.ûP~™RS"ÌíHù°ö3Å‹ï,¹˜Mç ˜)¡žÇ¨Æþgèqú‡ïCì­v!•Ô-(â²Ô{ž›Ã„[iuWçjßyáUýŒÓÕÍò¨ö¶Âvñ³iÖäQ„,D1aõÓ¤)±–¹[JÒiÿ7y9(ÙÛõ£R0P0U#0€»Ñ&ôž<‹ÏÙ{²,Ü£!0U²Jah©¯pù°/þâšr~0Uÿð0  *†H†÷  ‚W=ú¼ûÿQ̶ծ¬nEøö¦”~¨Ò J݆12ÝaŸfYב·<Ù)/3ÌÀD i±ºÂîù×mÑ¿éÜêí†Ñ¹â‰¬Öîêp¶†}øÛ·ÆtõëE”½ôE‘ ÈÇ]¦‚A¦E/ɧ+43.(ŽÁ1ŒBu„—¼g*˔ִÚ†Ö/T¬ÆÌ‰Eó RüæÇöóso¨£QÌOâ4ö˜ª<èñ‘|f¼ìkwçú៖«4wŠî‚e*‚Cac†ç¿\ÄÕÅ`2…'u …q•¢tb ü[oòÞ²å®ú½?Ö]ÂA¿ÆK‘#b:›_vÈ|£–i;öI’certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/InvalidrequireExplicitPolicyTest5EE.crt000066400000000000000000000016351274666402600325170ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0a1 0 UUS10U Test Certificates 2011110/U(requireExplicitPolicy7 subsubsubCARE2RE40 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Invalid requireExplicitPolicy EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚⨃}íÇ/(·BÐàÇ¡sBÓÁÛ·÷‰ãÚ0e¿),ÓõxŠ¡žíÖÎÌ> | »f–¨íä’—4CžáûýåÓÐSݲ¸(9a‚Tâ1>ælï=±úì|›Ìç†W;È{$WãùŠÈ*C(N÷2[Z·hǾ«MB¶.ÅÎd¦Ød dJ­!KQÇyÐßÖNL`æ¡6RŸUâ…áuúöÁÿ¹ŒiÖy(0jaÂÞ¯}ë/Bà…ÏìeZ_¬"tûe°’;¾Ì_o^"º.ƒ¹›xNË$TÔ¦ ~>½ËÙ~— ½™õŽã (à³W±Ÿ£R0P0U#0€{,Qa1­¬,k©¾;;’ªD0U¼» n mÏè­Áêø$«0Uÿð0  *†H†÷  ‚ŒÂZ ¤ŸdÆï-¯¡€Û¹(Ëw^à5ÿvR:kôÐí‡)`§x5ün6¶½Ñì ¼ÛžFÒÑLÐXqÞ~ŠÀÔßÖr-» öÈ‹cCñÀº‘Îi¢½_)ÿ¦hÑ–©ˆ4¼Y¦¯hóÞá_ýô!S¥/’?T`2‰ÚVxäGì¿Z'pR—O‘Vk™s€hÏ+1+ÈÚ!¥¼y,—ųO“ñBV·ØMé åš†Nñ}ôvS&äVi!^%Ã/‰P×W`6œ[²`M€Ê7ÛnÉ—Ý‹‡U²C*\©ÒWE‘€}Ï9a«´Ú1Lt¹Í§Ø€¸®Á©%+ØQ# ÒFãÓä…ý¬$'b6^®FÒÓ d Nï¾÷ä[ ‰hºjÒd¡¶!MH#&(ßùÔè*:úç¦ʾï½'´ŽX§D¬ÉâÂŒöŒ_¼ù¶;Ù ˜yÒ(av‰zT0}Guž.Á €g:´ñ%¦)sAÍWyu'ÆÄ‹±ÝPyâ8þŠyßýÁM7Q]}certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/Mapping1to2CACert.crt000066400000000000000000000017001274666402600266270ustar00rootroot000000000000000‚¼0‚¤ 00  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0H1 0 UUS10U Test Certificates 201110UMapping 1to2 CA0‚"0  *†H†÷ ‚0‚ ‚àks9çtž?uQ¾jÉehT¼µ,!°FG³›_K£p™3%]‚¹W¤GtMàEZ}ÎmjfgKÅöµ+D)®0‹“û^¸®”óLÀ]UI€ú!l¡r²HZоjÜ8Âù›©’šŒ¿áB>™²¥¼›Ðû]ðâËÖÆìØ ¢íìÈ÷Zã*1n÷Ëœ[×®‘[<ÌžjÒÊ'üt’ß= ê-âˆÒ‘ ›“4Úe[¿â%… 0²NrŒ øL!î¦pÂøMípkž3½b¨Ò“Ý.|ètõy®¾~²7 ±o2g`·Æµº-/Ö€ÜCQÑÙo¢lTs£³0°0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U™ÅxiË=3v™¬Då°þ¹ôÛÇ0Uÿ0U 00  `†He00Uÿ0ÿ0 U$0€0&U!ÿ00 `†He0 `†He00  *†H†÷  ‚£¤½=$( æÿ»KÍ…ø®%4õÆ¿\*D‹Ã‘ø ³qx‰GåîB)hf?ο•¥Õ3/ÝN>müèêûÇù>£[9-;ãBKˆ¬¹3! ymÇ´ûQœ¡W´c°›^ÂF,\¹b¡pœU>+Ò®«RÂ"¥Éˆ{UîÈXHSI$Õ³¥3嬼׻á|Æô’€>}Ó=ÖŽ43¨óÓð ëæ¡²ÍE°*ˆF,nÌ–^EYÇÜìvÒSßžv­<[¦‹²òº‘ÅÝ&+L4vé6—nu¬ƒ{certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/MappingFromanyPolicyCACert.crt000066400000000000000000000017011274666402600306360ustar00rootroot000000000000000‚½0‚¥ 30  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UMapping From anyPolicy CA0‚"0  *†H†÷ ‚0‚ ‚«§¢õ ª\ßÀð0Í?òeÊW* 0yÆ4X Ï Í ÂþÑD3PH±‹[H˜,›evµ»l¡bIjÄì’»6°Ký ^º\Íí ºt¥¼Ú£º·ØÚ¦k0gŸü—hS‰­ìþÍ“Ù\°âøxÍ ™‚V¥oø½õ§±lNÄ’Aùt êÅyy*Y,qNî¾Ä.m0f5¤°:ñ¢¤€^sÇr³Q·>Dšž…½€Y-&¨­§ZBüÄRmÛ«xzCÔþaCN{eg<5U½Œ^ù³Ò–u€ï’ƒí$©,Iy%ð<³ýAæ1•¡©[ ÐÉIîe¥ÕI3£ª0§0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uhsà 4Ïr@Ú”–Ö«z¤o.Œ0Uÿ0Uÿ0ÿ0U  00U 0 U!ÿ00U  `†He00U$ÿ0€0  *†H†÷  ‚ K”•NN.pOõtÐ,—BáÆv/RÛh+ÀDƒå•5S À|¾ÀèT ˜°ŸšPõ‡!‚»'1û“šžk~âDÖØ¯{ùÄp›ùŘ,)”¸uERÉ'lÙYu´¼Jì1õž¸Ò¾'ƒ;Y:‡£â|võHÐ*Ï?èð¬÷T–Z}”Ûú#*ð;ˆe3V.ªq¬ ÀìPËÄ¿0nHÞµ‰ûU 7}¿!™Q¶ýìæÞæù—R×'TãÓ¶b°«rÚ½p1;>ÚdæØê èâohЋV!oH•›¥]£ʇQÝ£°0­0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U,í“ñp”‹-“´˜Ò·¬0Uÿ0U 00  `†He00Uÿ0ÿ0 U!ÿ00 `†He0U 0U$ÿ0€0  *†H†÷  ‚1îØiÉ€@]Í~='äË;ÀrÙ•zÖd´E¡Ýü¬ÂÓ@%<xºÍP+µ£Ò­;ë,VÏ7ws…æ]×¾C¸ŠQò½>‡ÏÆÇæ•ìÉ—©‹›¬’7•ççÁ¨„sr @Òñ¶ ·µO ÿ·ÅF„¼¢CP’w?òªþ„.ŠP{÷€L3üâz{®Äöáw,äñBexAÒ Á+ÁD~Å×c›x÷|¤B[I£‰^Ñ»Žn³êyc çëbÁ¢Â {§ø/¾±ÜMU·:ÃN"¸ªÙ¯B_ ¤9gê$`Ÿ9œ8ƒþ3!drúŽ´¼Zrè3öø#–º4à_›5certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/MissingbasicConstraintsCACert.crt000066400000000000000000000016031274666402600313730ustar00rootroot000000000000000‚0‚g 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UMissing basicConstraints CA0‚"0  *†H†÷ ‚0‚ ‚´VvZƒ”µª±(›ë ‚dq„ œÉ)ÌT¹ s6?2½ûÇ#éJšÁ/2KA'ÎÙ6„’·‹¡$ØñÀÀ«Uô:‡´–VdÔ–‡çG‚Á’t8ov=–CitwßJõHJYêÿÏ™pȉ$·¾Ñø§Û§ûpÌMÛ‚¼ñê&à°ëÆø:ú$+¯ùF|ŸÇåhÕ?OÔË‹b@…81u66xP¦­Í]Z¹˜a âÙí§û’~¾é«”Áþ5øûócDé3‹®ë‹†Ñ„Á´ÃfLõ»”¨NÂàÐ ¨] 'ð&‰æÞåˆA L/ ÷3£k0i0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U0V¼OÆ&Ƶœ¡p’ÒùO y0U 00  `†He00Uÿ0  *†H†÷  ‚X'>ÌÏQ³ût„¸û+ìø-Žð(æÑdx/”_ë¬m̤Fõlƒ ~wd™> ›q„:ƒP°ÓR÷÷Dú ]íû–@kÞI„Ûùv6b qÔè}¶ìÑ„ƒÙ·$Ÿ#H‹¹jPw¼GêâNRxé"ÄÕÝqsÒÀ Q‹wäQ.×ð01z¶ŠhNH¾ðëJó4“œ³ïYSeŒ6ƒÏ67ú<¹øá@û3"ØC&Ý‚ÆÏÌg»)½RÀý›¢{ˆ“¨?jîÂagêæ=©certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/NameOrderingCACert.crt000066400000000000000000000017241274666402600271060ustar00rootroot000000000000000‚Ð0‚¸ 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0“1 0 UUS10U Test Certificates 20111#0!U Organizational Unit Name 11#0!U Organizational Unit Name 210UName Ordering CA0‚"0  *†H†÷ ‚0‚ ‚¸#96º‹?N\L@ŒÓo@®Ö%˜wHc Ø®ž —Ó‘Mò¢² ¼àœêÀ“þêè¢à­œ¾ƒ0ôLl}ôÀ¢]†tZjCùÊ eÉ9ºñ³ ê³·Ûç’}oî,(Ì=渇°¥*]žOÝö†?B ZsOùºf. HÍŒtÜ¢d|8|R 7 ŽlÑ÷ÐK®6˜ãAü|ûyÜpÇQÀT4 Oö¸ÿ‘`—a梬/ëà†E˜!}jptPrÝ%Õ׌ªzós˜¡;Шr!;(øçB'Vp‰swö´ýyì‘ÊÇEO²Bomö¶™ÏA]¸ÒŠÇR+£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U¿J‹›MŒ1Œ[éÌÝ/èyQP0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚Q|ÒØÐøp¼ðŽI…|<À:=¯´ôçUÜâ•…µ+» Õ—:¯!ÆÌo¥ÚKÌ"VñXÐJ_ü;µC~ˆYêHÓŽØë‹0k ÛAäQ³>È6îhòÜ\óF<Ë,M¬jó´’NÉq¿Ù›ã:Î7|*N{¸´-ýê|øeØ>>†ÛÿyI0¾¾C3âÞÓÞ0¢ô´,Ó@Éc±…]Þàs¤Í;.cR"d` ü‚Q ^¨hŽ#cEø] îàUï~OmuÕgºB@ãñ ­“©ž¢o¡ñÂ*»{€—dº¤$ML9!Ñ]Ë#);×úMù¨–_µIbJ" Ÿöx‹? ÷Ð)W@¶D«§Ë~?‡=åE,ÖåÀ«'ÜÚ·þøu¼V^WFá0gÁ§níºU&\™f)§Q÷aŽõþY!¢S@æGß)^ˆ°ÔÄ¢§À?A¹Z20d2*7™6‡{£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Un®EÓùýÌ®ziý¸ÒLì0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚gÙµÃL a»ÛÄ/P¼<¿Î~G²ŠZ*†åPñæ˜G´,Õ/©¾>ÞJ«*ÿ.X_næ‹9éghrzIv³×¶+êÙì—Œü‚úW*•2§yPÙbøç!³¹‹ü\Ç{œ&æTî^b+#Ipà|>%œmUmL*>u%XíYjRl\©–©W”¤]·8üÀ8F¼{²ò_s|s%šˆAĬ†MKîšçù4¸eUëŽ07>5i×ùRãC•­K‚¥Å:7.̾úÙtî‰ÚOÄ—Ÿ-ДñÙ@²d€å[²ùþxˆ±O6ÙŽµ‰òIe›R Ž certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/NoPoliciesCACert.crt000066400000000000000000000015561274666402600266030ustar00rootroot000000000000000‚j0‚R "0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0G1 0 UUS10U Test Certificates 201110UNo Policies CA0‚"0  *†H†÷ ‚0‚ ‚Ö±‘FÙ%Ôd Ï#Ï=R+†ìøÚ©„…컺Kú è"Qp Î 1š…ªI²oºXƒÊïN g¢.V™&Õ=]1¸ùWU{X@ÓØã*fçôT [hÙ ÿú­Œ Ä‚ˆ‰¹:Fn pЦPõN±IüÀ¤n íùÙ“f*K%@È= 4ÃØ$ÞƒÅC‘H•5þéãÔ* 8÷ÿû«¨]°ã¬º}}üw;Ìgã#éí¨ZG\BùÒÇ$Ì¥L;NEö¬ƒŸ¸kvË×t5ïTª!¥ò‡t¶RKÒ¦É\ÿ]Nh™Œž†V±yþA´t€Ú”q¨¨êæÎüZ¥£c0a0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UB$í¥Kvœ—˜\tê:ü5äœ0Uÿ0Uÿ0ÿ0  *†H†÷  ‚T€…~ûœÚ©O ÙR"®.M:>é5 û®ÏZK¨_\*†~TPç ôVø•¦«ôkbÏr1òú†?¨£š~›)']Õf©îµfàÐÈuäQ¨Hï—¥™yXÝ"÷ѧ¬lèwOW˜5 0‰àYV/FhÄ’á ‘5{4¿4ù#„g=Æ0Ì´,XÓï’ƒLö’0ð"Bר}“¨ÉøØv[ˆ" èeâ§´»¨þúŠ{o[÷º…%×:ßœöx]ùŒïlî¯UXÓï»3Ð~ÊY³òI÷Ÿ4ØU.BÚ­dªPïS2r eâ¬-øòJ¥certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/NoissuingDistributionPointCACert.crt000066400000000000000000000016271274666402600321260ustar00rootroot000000000000000‚“0‚{ L0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0W1 0 UUS10U Test Certificates 20111'0%U No issuingDistributionPoint CA0‚"0  *†H†÷ ‚0‚ ‚À«ûuj÷Î^â ¶çÛÃ?±ÆWºøAÝŒE r#ÙÜgýú¦<´ð*ʘõ€~eY©'9$”uÿGÑ…YMïGkÅ*Aè¾ågÕ´ê)Vö¨³ÚE¹ú°÷Ïò=V}£ 9šéÖf̓¢[.;`ºxhï›iØÍ½îIºãê*•5ÈïzÂ)>–Y:‡\¹ô ­ ÷÷±4š³j%»õ»¦iô͵UùYŒîZ|›a ,Ñk#@Œ0°yæ2Rv„Z¦DæÍªx\ZRºy!Y»Øù¬‹Ïö±žaZþ_Ã8èKÎ,X(Vq®}w,¡è>&^ËâPÞ%£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U³ËT¿jüŸÇ1’ §Gk™Ÿ10Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ ܾ=óÉiž^„–!3Šzi+Å^-6§Âf—ÝDW¤fíáÂ Þ ÚLúõ7«ç#~½œª0ê_º¹O(Îà¸æføÊ¥€7:”–ÁòsÄî}#'!$ýô÷•g6æÛç[á?ø„$WǵË~9Qi4 ¼páæ¨Äâ5‘«‹2È`æùœ¶¤#©?h‡âW] ˜¿Ç5®ñ0jùuüºÎ̵ùÒAåß-Òú yŒaY„ýñÇÍ~Õκoù°¬‡ôïnUÝH]… ¢ýƒ%e«5•¡K lB–—È«ÂGt¥þÒÑ"„ ¸„”JÒ"zY̺»œcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/OldCRLnextUpdateCACert.crt000066400000000000000000000016161274666402600276550ustar00rootroot000000000000000‚Š0‚r 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110UOld CRL nextUpdate CA0‚"0  *†H†÷ ‚0‚ ‚¿](㣞­zÛÚ¯ët WQj¯‹‹‘rWc)ìû?Ä‚ßÕÏuÒÌê„%QT¢<¤.Ú6µƒ´ †LøQ§Ÿ¦øßʬ^Gˆ=O–ý^6¨»2m&‰Oþ$¥ç3ø ¾ŠÿRhA»¬lTu­øTù­«WŒnw%@®’r½ŽÜú¸QÜg[VBûJå,ÇÔ#Ìþì24m‡ÎìSIÔús)®:¦t´"¨<9¼Ÿ{å”ÌFÛÕ@‘ ¤{ƉðI–ò7 {Ãð³ë hç‹ý3V_ü¶d–lF¥-ÿšÒà*ÍܯVÂ)Œ+$ýGó››N‘Q¨ÍÃ~aèÙ£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÎÚÚZÌŽ—ú )O¬–*Íx0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚¹$¶•ÇpóZÃ{HJüñX}†5þÂKÛY>×Òý£s.)ð)ÚwûÈÝ,æ4ëT‹ó{M&(4xŽØ 7‡•óÑdO¡qÄßÃÝJcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/OverlappingPoliciesTest6EE.crt000066400000000000000000000016641274666402600306330ustar00rootroot000000000000000‚°0‚˜ 0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UPolicies P1234 subsubCAP123P120 100101083000Z 301231083000Z0b1 0 UUS10U Test Certificates 20111200U)Overlapping Policies EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚ÃÑP·f†p;ÈíN6@*Œ€æá:I•‰J:”#Ò¾Ô.”© zj‰ÁÎb¼éãÌI=OÆ5j .ñ3£’?´¬â¦Ÿ5HÉÁ­Ä %`hü? ¶ñ*ýò.y²Y(Jþ0«¯%FœEà•”6¨áƒHTîÐcöTŠ8á÷‚©ö²`ä|ùfãoD²ò‘‘䗲钺ªª1IgÄ®¹ÓA%³µj'Œ¼0œ%ÃßjßåÚÑ¥Nˆ·¡ÃÌš+´3t¬vÏïî-5Áì"9ÙeÔ¢A”Ÿoý%¹€' Íw¨o´ä¶žQŸþ¥(Ï#ÿÖ"bÆÃ#‘£|0z0U#0€Nô^¡ù0{e¬’À ,Ó´–0U’¸3ÜuBpÍí£' ­ønçXmA0U 00  `†He00Uÿ0ÿ0Uÿö0  *†H†÷  ‚b%ÚHâˆa+1Ý4*é3D ½·öŠ‹=#p¸›ü,Uóù¼E«îñäl“Äfw(¸Ò© »º3¤_F.§‘$œ.]õÌëòÚê‚£HG“ðÉj,:­eþ¿UU9]Þž–{Þ0MÇ '¿l½Ì>èO^W2€¸Øv ,ø@ìr*`=“kžž¤¸wtjí eç–-Ϧ.È {sLt-D{§6í 𣠨dËJ}ãmO²ÿÙNI£J@*’ž÷R’g'5ùì¢[ýq>«¤xân¡Ù'!5È>RñK…ÖvõÈÁæîzMT¦ Ðþ5Q«Ö=ëQްûV²u<®‹× ³è®\»=£Á0¾0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uüôa32€|}5‡Þ_RûiñÁ0Uÿ0Uÿ0ÿ0 U$0€0%U 00  `†He00  `†He00&U!ÿ00 `†He0 `†He00  *†H†÷  ‚‹†(é(Þ mdþ^ÓÆœù¥Ú˜•| r¾¯ò~‘|#~ÔÚ ]µ×Ö-‹MÎBÅ> Ù¤Aûax×m7¶¼I+­*Ý>¢ë0½“Šß÷¬-@ÄŸÌ 3$ä‹ã‰îLÒ@‚/,…¬]˛顭F¤nÜ+ѧ1æ87Ý‚<2lözëpq;¿,û¯¿®[|ù{‡â¦ûûÄ»ß (¤‡ÞtÝ}P¥¬†‹u¬5ùØî…ðsM}};õ[éŒGŸ’émî©ðäÎ#>MWüÍ™›w›§M× ÄC@lÝÎjïzæ·‹Ûqß0ùúùüIˆ.²E­ð­certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/P12Mapping1to3subCACert.crt000066400000000000000000000017501274666402600276320ustar00rootroot000000000000000‚ä0‚Ì 0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UP12 Mapping 1to3 CA0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UP12 Mapping 1to3 subCA0‚"0  *†H†÷ ‚0‚ ‚ÄD`ÏéR-6I±·û”OúÏœglϵ“”¯8”&¸£Dd]Ù…+6çùøÎŠjMGlOÒ–»¨¯JÄ?3Wán3]±_y”s.֛ŋɿSUâ‰È!7ïÈ“dC"æëro>­‡[×ôÖçñKCûmÍ\çIŸChh·„O¡gÃdgÙ{¦üó°Šp ¶fyûìøÙBoÛô#jSäJ·]Z¹„EPrjGb 0‰Þá/óù<ÍÛ×€:>sRf¹+ŒçR;Ͳ™ªÇ±á/÷1(certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/P12Mapping1to3subsubCACert.crt000066400000000000000000000017241274666402600303450ustar00rootroot000000000000000‚Ð0‚¸ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UP12 Mapping 1to3 subCA0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UP12 Mapping 1to3 subsubCA0‚"0  *†H†÷ ‚0‚ ‚µ!…S‰e…åõ#¼GâA·€nº’á /7'e®5—š™UÖý‡p!­%l‡[H’Œ>hÿTbÖ¡‘“ì K¦WW’5š÷ÏŸ±ÉH XÙVVñyâöŒ¬ïܼ¤Í¾ÚBÙ! O;`@*l*Àvùaã?B˜ Ùt[G›y±Wl#Ç‚ÐÂÛR QÙ˜¾KÛÉêª(دµöl7,î^‹C•x¦ÂæÆÒÛ׎Ï;ùj×°Ê3mÁáQ”¯óD7N—%OÖ¡ ªsÒst U7†2ÀÚ,&½S¸ƒ–ºŽM{ÐdÊÃew¬±Uý{XR+£³0°0U#0€¾{“¡ä›Å'<0SץɿZ–z40U]9>åª*^-ö®h*­3›=›s0Uÿ0Uÿ0ÿ0%U 00  `†He00  `†He00&U!ÿ00 `†He0 `†He00  *†H†÷  ‚'£î°œ¬®Í*ï‘rz÷!ºûÑK,™¿²n‘ÂJ â;–ö¨áíG. Ph»€Öò‚iÁb ô¸¸RKeßÃRÈš–:[;( Æ@âÔšßH×Þú}ßG[©g*J¸ô£xC[`k‰ærnéw-ÅÒjà)tµ "ÜôçºÜ0ö¿JúZ‰b̦÷hê0Ydy‰cÂ~¬+úc€‘dWV‘‘pVm¥lí=×ZÆ Í‘U"Ê?ËnËæ×ùµó¦=¿u‘¨]Õt¢•"«GºCRÈvP¸ÙˆpLãa–˜ëÏT’G¦ «ÖˆP®Ûzàê·ÉJ"ÌjIcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/P1Mapping1to234CACert.crt000066400000000000000000000017711274666402600272070ustar00rootroot000000000000000‚õ0‚Ý 20  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0M1 0 UUS10U Test Certificates 201110UP1 Mapping 1to234 CA0‚"0  *†H†÷ ‚0‚ ‚èCË{~ê91¬T@Bòígÿ½¹ѶOÎã¡ Ÿ$[-UOùãÛP@{Á‘øÃÕι$sDzüµÇ»PSìEßm¤O6ñE¼NçÝ-žó‘x «æWýð Ï0K¬f¼ƒ­riH Då0,úŠ+ÔB=ÓKæ~IAv؈¶Ú†ùòËGÇ…•ÖMµ²<4v(áõ]YúÖzpbÆVž=Ð/ÖÌŸs?Nh¬q§Lì†yoýqZùDS¨7{ªö¢‰æÝ^Öî=qÒ‰DCqf`ˆ¥4ÆÀzØ‚eÕOÃàüQ¸£Yá÷噸ké:´gõ*`Þ•£ç0ä0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U• ©IxªvÚ ¬ˆùõ÷G’0Uÿ0U 00  `†He00Uÿ0ÿ0 U$0€0ZU!ÿP0N0 `†He0 `†He00 `†He0 `†He00 `†He0 `†He00  *†H†÷  ‚E ÊInq¥õ4Tj¢Mɪñç~!€”£©H÷aslqw;a`œf/ñ>ü,7-<í„v„¶Þ¼=à|vÜÃŽ3/vÆ€˜z˜ÍY÷Ù1Ô ÅCx`•Kˆí3Æóg7âçFéàÆy:¸§¸û (ˆéöátìc¼ÓðÔÄãa—vé‚©ì+„ìÒ€¯Ú؇°Åˆ_}ˆe–j2»”4zÚ¤–hk Û&ñÑç.±ÿqÆL¶#zò?Ä 5®Œ$“Kí¾•ß=SQæÀ¸†³‡udY=Û2•Ââøz"ˆ{1g¡¨Møš“ 2ѾR,aò厚«ñ—¶kKÍŸ ‹certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/P1Mapping1to234subCACert.crt000066400000000000000000000017521274666402600277200ustar00rootroot000000000000000‚æ0‚Π0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UP1 Mapping 1to234 CA0 100101083000Z 301231083000Z0P1 0 UUS10U Test Certificates 20111 0UP1 Mapping 1to234 subCA0‚"0  *†H†÷ ‚0‚ ‚ª߂¢¹.¹<ù%¹e_ý]ë®èÈ~‚ï îæÄÌÕRÈ÷}Rƒï!´ç¢|8¶šWeúvHä"9&Æy‚†€Á5‘࣠€AJµš¡Œîp³©>[E:3¯WV웉ÈÖM:JV PΜ5¦Y$Žô¢”Ùµºþeš™Ê!y»kA PjjÒwpŃ"eöÚñµ  Ü òNüÆ™õë3EéL.œqŠÜYÁ;Pa¸{À™>ñör„?g}úxÕ½"bŒ¾Tyñ¶‹y;Ý`úµ6ÀõMHŒ[Äu¸æÁX2R§»Lž›Ε˜ÄÝ”¬C}èï…Œ[­%£Í0Ê0U#0€• ©IxªvÚ ¬ˆùõ÷G’0Uå•ý*9x¯ËFö@˜e í»0Uÿ0Uÿ0ÿ0%U 00  `†He00  `†He00@U!ÿ6040 `†He0 `†He00 `†He0 `†He00  *†H†÷  ‚l_gæšÈÑ+¢£ÝjB7(—JF¸ÆÖn$Š[ ‘p|Ï]mƒð¾ä=puàäç»ér¹«ëzcóUp›)ês…ÀSIvM†¦*“Êm›Éó?{CëBŸ;µø·tx`¤Ç€V«8{K’¿ûStùötœÓþXi÷Òôs{Ny%Ä’rˆ&5ÄÉÒÆ 9Øo…Ž–ò:ÇaŠçFø[ŸÂ?ï•WÿËX <·`à1¾ŒWiŠVWÄü|»¯ÊI•&øAÅxgäÓMowB0€kš ]hsÊ£žâÎ.S»œ5,Á† í Ò"± õ{®¶ø P<ÇG„certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/P1anyPolicyMapping1to2CACert.crt000066400000000000000000000024611274666402600307250ustar00rootroot000000000000000‚-0‚ 60  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UP1anyPolicy Mapping 1to2 CA0‚"0  *†H†÷ ‚0‚ ‚ÜÛÿàõöd‘Ëk]åÕÝi7y@Ž›ßÞç¯Ï¥–À%¯ÐjÁ‡µßؘ÷ä`Nºè‹Â‘æZ^wX€ Sç…X ÷L­'[ê-¥þ[& ™Û»%¤RD Ø+¤´)ÛuÙ…dC­”b+½‚1™®àÀz“Ç÷ÃjuÿO^f˜æ¦¢ùÕíÂy(_¦ñÕ9 As“׺¥lçò¸ Ø3Zm}~ó¥Äõºö.‚oÏóýYê§‘m]OšíåU(‰Ö0ÍœÀ Œ;<ø2”ß•)7ož°ÐÆæŸ–¿¿wœ©˜Ð$—SªíàfD![@Ö¤›¶ †ê÷5ƒ‘£‚0‚0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U((2ŽJ„ø¸‹Añ]{è%Rk†0Uÿ0Uÿ0ÿ0 U$0€0‚xU ‚o0‚k0¹ `†He00ª0§+0š—q9: This is the user notice from qualifier 9 associated with NIST-test-policy-1. This user notice should be displayed for Valid Policy Mapping Test130¬U 0£0 +0“q10: This is the user notice from qualifier 10 associated with anyPolicy. This user notice should be displayed for Valid Policy Mapping Test140&U!ÿ00 `†He0 `†He00  *†H†÷  ‚ ã;2ö¢õÐârýTdÔÐ9Ãí'p=d9s´#gJ :ÂÔ:#mÉ=ºÐß½¤¶÷AEù =QÇÇÜë½ùäØÂ}ÐÞ£ÝÈT ‰é¨,Š"ùqZ”GÔȉn^ø wH¥×;Áø8æ ¨Ìõ§eìg‚¼F‘E”`kÖ±~àïÁ#¶ƒÐ?OÅjõ5®ä~qècêw÷æE‹g vê3¼PÇ^ Öz±?~u%O9´qÍÔã–ŠhF¼©ŸNAur!VÙ– ÑhëêSs%˜2mˆ¼êó¤-œg÷eçé”æÞ ‰¡7Tç0í.|΄us[xuä@ Ýs„O/¥‹certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PanyPolicyMapping1to2CACert.crt000066400000000000000000000017051274666402600306440ustar00rootroot000000000000000‚Á0‚© 50  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UPanyPolicy Mapping 1to2 CA0‚"0  *†H†÷ ‚0‚ ‚î+y* ¥:näƒûÞ'lu³nY#ö².ŽêRŠe(óüÄGìʱº7Óög¤g©‚Ú‚Â6ÏZo]“ãÆ—æ4á:Ò§* tÐ*%” ôã%ç`X|u|Ê HèRè±'º'À9‚º§6!TªêNĵ2; ›,2+ÌË=L™½¥ó$àw¤À’žø,.Ã>­uÙa2zõ"Y~þßX†É¯žê ˆŠa<©.àj;d´m¦;'ÿàÓ*I«û³9€‡â¾[ʤ£ÐXêÐÖâAR{`ì…;è¼úu›¤š8u!RèSÂÁ1Œ·ÿmí)«ñL—†ë“#%ÜŸ;¥HŒ6àþdÍ£­0ª0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UG'/C=Å/Ù’¬ÇÒvÐ3Æùw»0Uÿ0Uÿ0ÿ0 U$0€0U  00U 0&U!ÿ00 `†He0 `†He00  *†H†÷  ‚Læs¯Ç8À›ðW^èÕ|½øÄuìC¡ï£b@p¢j`!a2k“peƒp~)Š 8Pƒ^õV² Hœ€ ðQÛ¼½í¬'M§Üs&±‚RŠ 1“NÉfêr¯ÑTq§3-é-q“­}£¤ôÕöÁæ—(/Ã&’Ü“E¼bFB$Ò’xNåÁÔ1ÈÚ0Zßß\ø*ÿϦ™ÊÂÙX–í7Á à$†§fÆ_J $ëv¹'½Uk SF‹Ø~åÒÆä;Êéš‘ô¸Ù.8üD¼[ág…5½î"*×y{ZNø„x“ã‡qmnPqûLš‰«úâ±Ó0ĺÎcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP1234CACert.crt000066400000000000000000000017041274666402600267330ustar00rootroot000000000000000‚À0‚¨ #0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0J1 0 UUS10U Test Certificates 201110UPolicies P1234 CA0‚"0  *†H†÷ ‚0‚ ‚å›0‰øcÙÔûYO6ë?SáVVÉÎ,‚Ñ)RìW°0ãGh§w„}$ò¯Þ³:aM÷¯ÿ—kÞItåjÅóÂäÏ‚®-!‘-M)eÓ&ñ“û²ÕBx³VSÀ"4B¢p›˜Ñà™Å²‚!}¥6Äþrá‡òi(¯ à9fÙn@^Î ˆªu"l 9Fü ½Äètÿ®ñ›þ2SYX„ƣÇorÄ®WâN6‚…¢Ó:.kcâ|U›°ÒVÌ%p⛵¢,w¬šõRæŠëH…„x³œŽ˜ŒòY1âY4 l|H4óÄõÉúãþé{êèÏ/ÿG ¸ÂÐkýȱ¹ëßUÅ£µ0²0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uöý©Œ&,´ÏÖÓëÔ­’j»$P0Uÿ0Uÿ0ÿ0 U$0€0AU :080  `†He00  `†He00  `†He00  `†He00  *†H†÷  ‚<,⥿é1ºÍ™lIavDªìE!»¨ÅÚÔ®ÄXʤ ñðÿÔ{¼B¶XPDp¸º2jÃÛ”æqÖßôî2Ò¤ý‘íXÎ}*šáír”£ì?p«ÇñvxéÎÉÝv2£¶ÙÝüÉ;†~ŠÇ ÉÐWά ,`Žö‡±ËÀÖ^=h:;žFÒ´4×OöœX¯ëZ°q»àËM‡œ5* ¬IÓ¬,‰lQ³âéJ‹ö›‡½iˆê­Ëë'Q^4mÊšZæ¨ìeü¤žŠÿÖè)¿Ûç1P;:ݧ vÿòlaÕ§;±ÆØ1N\y”MeÕm¹ÎÆée^ïÿ’^åjbr’®:чq­ 0±Ú† ö÷¬¢·‚3‹#yÊü›%®g™.ŒÎ{N^IÀÞž.\ ËGF˜Êa¥hš²y?÷ý+Ýv¡ ²/݈ûº}4n3âc–Q IÚ°µÏ06Óϲ‹¨üpý‚Æ.‰ç?#£™0–0U#0€öý©Œ&,´ÏÖÓëÔ­’j»$P0U¹ªP¦4fQhBî)ˆjìÈ|÷0Uÿ0Uÿ0ÿ03U ,0*0  `†He00  `†He00  `†He00  *†H†÷  ‚‡îÙ…!ïg ¯fÅa$mÍ'¨¢Éí<Þzý×ôeñ%À`®þœŸFr²ML <æÏ›I¢@'I 'xÒ}&ö8È$†’¹+â6‡³v‡ÐLJÊÿÿ‰ozñ£ŽÃlÕ¶Úi9gC€å'ÉÂÂDö˜×(yõ&7±Pp=NS½Ù‘ˆ œÜDÎþ°®ìêg¡L  €˜ÿCªjW"°¦Â¯LL«‹²Pìà]Þñâ¸$~¢‘Rò¸ZlÈ ´1Ù§‹G Jï´ðÄkÉ P׉ìûéüR%ƒóŠ“ÂèŒÑújˆl“9[>»certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP1234subsubCAP123P12Cert.crt000066400000000000000000000016631274666402600310140ustar00rootroot000000000000000‚¯0‚— 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UPolicies P1234 subCAP1230 100101083000Z 301231083000Z0W1 0 UUS10U Test Certificates 20111'0%UPolicies P1234 subsubCAP123P120‚"0  *†H†÷ ‚0‚ ‚¢èÝF¶^üm¿Å™t7i’“Å<ßÔgk´Ný|5i=Ƀ#jGYà5p|˜/Žû¸¯.)1¸;dch–Ò¡nWGñUP%B‹ ûì#›:’[‘â[)®&¦øÚ¼B}·JÎ9xÁNùh"”ÿY¥ú'¤øÍÜ6cÃYÍ<íWÌÄÕPÇÁÀvá`g¿©#¬‘®òEý~ÄQµß—™´ø7Ë|>o'¥Ö„êt´yL7Ò—´Œ|í@.ÊÜb­Ä¤¶´V^ŠY¾:Î>$OÌå ÅÉsfÑàÖΩÀ :˜DÒ,Híh2æ(¹Ã¾H'ß(÷—eÿÐ×´<ÍÓ£‹0ˆ0U#0€¹ªP¦4fQhBî)ˆjìÈ|÷0UNô^¡ù0{e¬’À ,Ó´–0Uÿ0Uÿ0ÿ0%U 00  `†He00  `†He00  *†H†÷  ‚¼¼¨ÖÇçöj™ßSªt¥‡fÕ°¿Ð£cÃeš{2ï€r82o‰ 6 Ôè_) 2ÓéÈ™÷šÛJcîO¤ qS7,06² ÇïDÌþ@®Bb„à‹2Mº0ü‘'Iò¦ [ҞűˣèuŽC‰Û}…މ†v&°ifË¿ò‚·Ò× ”Çãi¬h‡Þã üÅ-wÂÐÕ×åÙŒïø(ÓBüD¯Â¦¸¤ µª--$ѵÏ>nèV'²Ñ°ñßêȽQf~ðÞn,®hßÓ(Â~ƒÊék°lVè£,ÙrW_‹íü.0N=/eż5Îß9m2certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP123CACert.crt000066400000000000000000000016651274666402600266550ustar00rootroot000000000000000‚±0‚™ $0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0I1 0 UUS10U Test Certificates 201110UPolicies P123 CA0‚"0  *†H†÷ ‚0‚ ‚Ÿ|àÆŠx{>¯°îhô¿$Ù‹af5ÿpâo­ß)ÖÖH˜¿nìè—VŸdù÷Åm‘ˆÎC£ý՚Ÿ˜µ[ 5hCiIFqÉxS D]hŒ3¢ÿ£!~1oc×ßÖ°–h®i!ÈÜ}.¨8o~ÎÞRyiu櫦è@uzæ’™v†c_?‡¡ž\%NÑ× »g{T`×Ñ2”ÒùÕ’q6Ø)pˆÞAD×e«Ö­²È V"Ã}dÃ8Òõž¥/©>nˆ¥ÔBí¯´”eaþ˜ü' âKòGãD¹cEVXÍVi=q‘ýOæÏÕXˇ£§0¤0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UŒ( Ú bî==–¸q“‰êèc0Uÿ0Uÿ0ÿ0 U$0€03U ,0*0  `†He00  `†He00  `†He00  *†H†÷  ‚+Eõ#nx‹9E­ke+ýv3®öNøAz@‹ÔEõX&•šÀâ g7É¥AÄG¶ùÚoSŸ¨“ÁþŒž4;Wã¥nûM¨¡î¶:ëŸâé”jùªºz™0{f-uÂùðñŠÁoÖGKœ#¡g¸¦·`^Í*›G bèhhìøGÉêu‡}WŸ«f®+ë˜ÑÊ¥yñláô»hjÜ9Ö÷þäQ=¬¹¼æ™I®Í¸™c½q>(Θ{†¸Õ6;Mí$ëSCÁÏÃÁ;îë)vô3ünñ>[EhߎÇ‹#æ,­üzá,)¿àIå™PÀ‹‰ certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP123subCAP12Cert.crt000066400000000000000000000016431274666402600276460ustar00rootroot000000000000000‚Ÿ0‚‡ 0  *†H†÷  0I1 0 UUS10U Test Certificates 201110UPolicies P123 CA0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UPolicies P123 subCAP120‚"0  *†H†÷ ‚0‚ ‚­D­©Ò;vÀXó"Z‘ö¸'˜õº³9èðž‚Vn4wóLƱÁôF3®|7:ô„R|–À:p({p³)»"y ‡á´-ò‰|B’Zƒ9ƒ¼þúP~Ò%½7 ßoÏ e×@XjºçšP%µÇ éyàÿË„‰–¼êŽÔ 1ãY͵Íû$£CûÕh¶åÌ_~Ìñ’ud+A³ú…ñsâ…ûÞç@É¢Þ¾é¡}õ=pƒÄETúvF[šWÓL/@Åù…ÂútÄ-ˆc¾0¼9ÉR®Ê]{áËl £|0z0U#0€ÎÚýª“@øÀ y­ÁxÎ×'öž0Uä>F·æÈ©ØíÑ3áñ]$Â0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚‰rŠ_ÓÈΖšÌOŧ£ÑDUá ¢J“èQOçu€b,¦>ê­å äõ5Fž;T@¥¡Û¾µte$¨(Ê À@nDÁÚ;Ê’ç’p*ÏT‰ü;R;LëÃwZªë/GJ¥>#·ƒmpáê´à›åê Ó¡š/alýmÛÉ!y²žŒÓÞY€qm÷W"°´ß‰îº4ð×|˜ÒHr|y€ä •zaa  ´w*Uc[ýG ­öJœv~;§ßÞ“EX0 ÆÅ6$Ú{÷6Ь¶ù»–½YþÒÛ…9Õ’€3¢›V¸ýX–Å».à]ß?_Žâ¦cü(X# '`certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP123subsubCAP12P2Cert.crt000066400000000000000000000016361274666402600305640ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UPolicies P123 subCAP120 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UPolicies P123 subsubCAP12P20‚"0  *†H†÷ ‚0‚ ‚®Ùr4§¯ô_ï+Lÿ2º‰*1BÙðÉ7«1…yhÁ1³%-~Wé£6¸Þ}±+œ>•ž{ç$u6A3 ûa‡ ÃE¶`ü‚uÙK1›ªõIzG²:ð5×í?y82y§¾Œ'tõne‹­™ÿAú–¦l[–P ½È)$_¼ä+*m±ÖßgŠàb Plk†mo¨Ì•éÐ`¬Ä¿šøDŠ›s&êeˆÕ]TSÑ@jHÃÒ£yÊcÒTÑóÑúmàThΑվáÁ î/;fYW+=vc<-ú­É27;sv §ž¨BÌÚ óªÉÎÒc'8YˆÎ\(E£|0z0U#0€ÎÚýª“@øÀ y­ÁxÎ×'öž0Uéü¶^VNÑ2ýˆ`køi0Uÿ0Uÿ0ÿ0U 00  `†He00  *†H†÷  ‚MœˆIÕ¥º Ø„>+3'ƒ°h×¾h•J þîrÄ]sƒ¿ÍÐè/V™q–(ŽÔ?ì¼ G¸VüâÕ†å¢(ÒÖpоÝÉ¢_/ rH¶ß~ÒYX¯¥ÊA‰ýlÐNM9¤tN=0ºÐ%Ó›R¡’ðÙ¬l.%-ÐwØ*Î'´ Ü$.Âm3Ìü5i–¼çX¹^°•(›Ìï}Òn%<°ˆ©Ø¶ü³/NbÝÌ»ˆüü`‰ôàŸ)Vç·sãgš1òHôÍ ¾ä2MªcéÙOúœ™!=ø°ÜåÃCêN¼qÆéAXÃß]Æû£DC‘мüÓÂBp MøCîEcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt000066400000000000000000000016501274666402600314730ustar00rootroot000000000000000‚¤0‚Œ 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UPolicies P123 subsubCAP12P20 100101083000Z 301231083000Z0Y1 0 UUS10U Test Certificates 20111)0'U Policies P123 subsubsubCAP12P2P10‚"0  *†H†÷ ‚0‚ ‚£Õü Úáö9±„E›o2÷e;²¢=÷–—‹™~u›H–^nH]N”oó}p¦`[ù鞦Ó_ˆ«EÒ‹n£Ãv} @‡ µ†œžøïùÁnJVÉÍùÉ}ï«4#îËKܘ@>‘šç®Ã!Ë”¬ŠÌ=ÚÆô{õ¨ªµE쓤xwCÅC^ǹ’˜t¾wQõd[<>ÿCòØ­gëIUƒ£%~ïwú;.ÀXÅH‘ßku±H’ìR×Þ¿V«rpÏŠa_c?MÝÔ”&Ф¿±að»’s­ÁTTpY…ÝóûæÊ¼) g|ëžÑF¿{ˆ)Õ«Ùg8™ŠCså‘£|0z0U#0€éü¶^VNÑ2ýˆ`køi0U‰ „û¬» ×Þ^^žhö9P@ˆ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚s?¨î„Xìü;‚¢üðå2¿\Ù”µ``á÷š¨ê¤ý+’U»™¤…›Â(Mºm¦êôä>[¦3eÝ¡p“€A:ȱìÛA,ÞÆ$úÅ©vä ,Ðé „ìñs‚ô5¿ îLM”ÒÐrƒP¬N`=[4¹æf[ÞœlÖÖ äCN,‹ó \Ô‘{€¢EMëzHR§Vè)lô©Ç±„›]Mn=.òg_Ç&W:ëò†>ð÷/§Ïú˜å“õ–÷ÚCÈ×­¢¬/mßî!?ƒõc¯² ƒ­âçàØöÁІG%jûçã/rwvþœq›¢¥§˜8ö7Þ^Ó¿;Ù ¶Ê¥>Ncertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP12CACert.crt000066400000000000000000000016461274666402600265710ustar00rootroot000000000000000‚¢0‚Š %0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0H1 0 UUS10U Test Certificates 201110UPolicies P12 CA0‚"0  *†H†÷ ‚0‚ ‚ÔmÈJ¾®_…„ïRN$ÝŽˆ0Ö7ghïF×FÒDÏ¡ÊÛÙšm C¾·:먞¯¿ç#'Ì6I|é²Ny—åW’Z6L_cv„ZïqLÍW! O¢YP‰dÜV—×lF\ºFw0˜WÑ«‘Õ§xâçØ-/´ =§ Nÿ­(ÔžhÝ3|>ý©OÔ…™¾R#–‹i¸Z?Â-]"tòMbËÁÎ,y}Ø`Ž7èÐîlž¶0²äãÒ‹ö¶µŠù…ªO±‚•8÷‡–Ç@(?;GEr¯P!4Âfn“æ €š @Þ:ý^÷\Þéñ¼‚‹ƒç8Çu£™0–0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UØ_5âšÁ7*&΃Ìsp*:â10Uÿ0Uÿ0ÿ0 U$0€0%U 00  `†He00  `†He00  *†H†÷  ‚’jXèjsòÛWq„Õ’q´~GYàÄ#=…›íŠ3ÔX:à¸û¦ð¢øª2$V >d8èj)ÞꨰöKy÷9³9ß " ~b5žFÌØJ¿#ˆ eƒâ|ǘˆt0¸Î7Ñùhâ‘=Šdv¾¬³ª¾`óìl }ZÝzÄTÞõ×­Z<éúÁS$—ÏÍ/±´¼ê¤\MuZÙŸíäù1º'‚þWþ`ªzE£Ü-ã—4ã€Ä6ãç±…‰)ù—<öýå¯7Ø´¾.šãl b/Š»¡úN©¸x¸ÈÉW ÜÀP˜QhtÕƒ@§-äx³#)I‡Syüêcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP12subCAP1Cert.crt000066400000000000000000000016201274666402600274740ustar00rootroot000000000000000‚Œ0‚t 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UPolicies P12 CA0 100101083000Z 301231083000Z0M1 0 UUS10U Test Certificates 201110UPolicies P12 subCAP10‚"0  *†H†÷ ‚0‚ ‚ÃŽ6}ÔSƒ¢oøIB Zе仡èÙI  ‘ÛñÀ‹ˣɜ[ÕJ2¼ ÚËÚúêŽN àX;EÒDš:õ/8Œ]˜×ó< ÖýÀˆRÚÇN?œç‚ÌY %‚ ’X˜e–T‹ìÿ!_̶'1—¡¯ÔbÇ«Vïpx¼7h?»9õ,u˜­m¤>EÍlùÓ%Ó¿¬7Œ‹ûbàº{!`¨X-[Ø,@8 ©è€K}àNÍ'ŽÇYê‰hšn*)y˹¥÷ü@žb'…u0\§®¡íó›HËÖó¾ 7L÷T{nóà—õ;éÝ0\V‚ýë²J¹;îTÊŒ©†8p|•£|0z0U#0€Ø_5âšÁ7*&΃Ìsp*:â10U"ž×¸HÎ :]¾ÖMX#VËÖ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚Pb\ËÚz'G>ùÃÙg€ÃÑ’ "šþ2ã–¥•aÖ/ëQ'ØÞ!Œn›‡W3ùhl™CÜ»M| äÂÒ•ßûÆ”Fü¡‰åQƒ‡ù'Ç'€Rr‰~o®v pc>'°Šl *¹âË¢,$ÔˆTέÁ±ÁÅ)¬y¹ÜÕnïø‚ŒÊ}þKPrÝUf<_!­ÍäáÄvB¸Q†ŒrPŸÖ¶ë•,·WTVÐ!Ÿ$ÁI;À²xó5¹‡¹Øôü8€¹sà-î½IÜ¡› ¬>U=è _T?ž]ó›»¼œ™¥±¾nb‚Jj x·éF>¡®Î”¬ËŸ.É4h4dž]certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP12subsubCAP1P2Cert.crt000066400000000000000000000016321274666402600304130ustar00rootroot000000000000000‚–0‚~ 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UPolicies P12 subCAP10 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UPolicies P12 subsubCAP1P20‚"0  *†H†÷ ‚0‚ ‚·ӽ߿Ç9%Ýr0ðÃJM­ úëôЙšgraEÛ©¡ß mŠÄÅžnææÃ=*¥ÙÌOÐÍ÷¯ïÍ=jR ¿uÜR2ƃY©¤ï’d±`™®ø@«ý¿ðüUûÇ™3%M>YÉg/rU6l暤§DÿĤšÓcÑó=éuʦjk¦à³–¾Ý$nµÅ+gÅDZ~rfovˆ –ùÌ”øY~aC+ÛŠeá†eóäLI£\F°/!b<X z2—ôQ«Àõë L—,y÷¬ÉÛ›ñ¾ •ÕƒQ‚™I‡ñœyÀ¶xÝ%Ô>ÁC™6¹NÂÉ£|0z0U#0€"ž×¸HÎ :]¾ÖMX#VËÖ0UÇ¥7§Ðú$å|ßÛò]iÛîÊö™î0Uÿ0Uÿ0ÿ0U 00  `†He00  *†H†÷  ‚K¿Kš³ZB£DKžØXéÔåfµÏTÕ8DA¹þUX.&;¥1šuj‚: ’‰Ï*MÉ>¤ dè×7ÚÃ[&cLÛ‰WLsBQÖWé÷­"ö‚ýOböp©R´ÓçØà±õrÔ¥DЬ‘Qü; 3´.é§¼!;ö«6>)¸‘OûCø©ÒØY"øP’¦_¸4xtËEÐAJ³«ÿVˆ­’Yñ—¾t}ãKÌøûfÈ37P7À2VÔ©ZÙÙÓ•Sšv ñcÇœ÷[+ñ¼â<ÀyÖÔªgy·lß Ë[kðŸ÷·ù¥,Ù aCv"m«÷?ä:certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP2subCA2Cert.crt000066400000000000000000000016261274666402600273020ustar00rootroot000000000000000‚’0‚z 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0K1 0 UUS10U Test Certificates 201110UPolicies P2 subCA20‚"0  *†H†÷ ‚0‚ ‚ÀÕ|ôa\Ý|Ñ9ˆ|`Â%¬/¿°6ù?òÜIãì‡kac§3²íñ~G†BT€ƒÖðGîúõeyIØ,æ ÄÏm/v¡^<¿¬Í&:æTþ“Msµ¾2õ,KåÚpÎ>t»ªUí›Í‚^Ž¿b±QÀsÏ& —GÙÆœQ’àNYŠ„MX#^/ÚSŽ’uV ),YÊÙRq^iøØ"†¹Â‘™k _ovI|“l¢Â¯¡z9<Û5þ¨ë…P÷ë&3IJØ­hk·zß#I³sTJ‹"ÑUͼ!/Íw24ªïö`Pó4ç݇ÐÙ¥îÉÌl~O£‹0ˆ0U#0€X„$¼+R”J=¥rQõ¯:É0U,ê¸w=e¥¿3ÌzÒ˜ü¾0Uÿ0Uÿ0ÿ0U 00  `†He00 U$0€0  *†H†÷  ‚B‹š¤º¦sù[¾RŸ\ÃOˆ~0À$À?¬7/ ý2:h¡3sÕ½Õ8à(ùê~Ac;ˆýl¤l°(•Íàî?}Ô€o£—\ÙeU~½BñÍì\2òApx:duÐâ_3¿myôHsÞݯªšÐn–Ñ'¬:ˆt©xrO(8¨ˆL6c‘²ê#v暸S’Æõ5Å&”K ÆûR³"‡¯C¹o!5wøÇây®yú .Y6¸®Ï®;€¡0‡»;u@®êDæMùÑtŒ¥½Ñs^¯ìç½ .4DIЩõ5p©ÉM3·5‹O§‘&ºýMï>¼ú:³certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP2subCACert.crt000066400000000000000000000016051274666402600272150ustar00rootroot000000000000000‚0‚i 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0J1 0 UUS10U Test Certificates 201110UPolicies P2 subCA0‚"0  *†H†÷ ‚0‚ ‚ãX¥Ñç~I(½¡y l<6“+qñJql†Õz­Pi –ë°q†î“’ðJ]«óãÄ,ê/·µ<ΓJFM{Ûg õû3 En¤mëÓ¯grË‹>ÔÆûSAÃÇaÐk:k‰¿ãGÔ"{îÅö×—p !:>åœzæªÜGa– m$ªŠÛ€H9rA^*‡¾s yÇË8W-bèÉÅ h\LÙÅHˆè ©^@ælX«Ä8ñ´ÚA0dSíTju+ˆ·t©ÊÞäþf[ÅSoFžtßUу"±¹xTDhö`%¾g!šÉèÌ’˜•13ˆˆÂ§<àE’M#îM…JÑx9£|0z0U#0€X„$¼+R”J=¥rQõ¯:É0U^<„sž0prq˜®6Û"|¯0Uÿ0Uÿ0ÿ0U 00  `†He00  *†H†÷  ‚tkM ±å ² ½|KŒÃ¹">äY2ü=Ù ™ÿ6kVV ~3ªå×tj=éôª'./+á@%döáͳxÓJ„7KØr¨*ß9¬GŒùš„î81ŽfQµÜü%•årçß»¶%ŠÍfž®lÞ€èÌÆ®éY"XÝ·¥D9êç¬qܯ&l5àˆe—üÅÆ¢âœ­|9“Ư~.S§Þvùš*Õe‡>$;€ˆÉ¨òßòy…‹Ôy•“ ÄÀr{ô…Ù/,##¿ðp®}.ƒQm„YP|˜Øè}— ”Œ<Œ[¤uÌCÉ<&èz÷õÖÑlËÄ%ï»ÚL 0õ certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/PoliciesP3CACert.crt000066400000000000000000000016271274666402600265100ustar00rootroot000000000000000‚“0‚{ '0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0G1 0 UUS10U Test Certificates 201110UPolicies P3 CA0‚"0  *†H†÷ ‚0‚ ‚àtÙڬХ…“Ïf:ü†þàêÉÎî!ÏÛ–ÐÃÒ´ƒw6cW ÙÊ.¾´ðJ¼ƒ#Úö½›Ñ2ç±å 4’'¤‚™j$(±Ne^SÇÀÃóìÒq.;á…û U^‰aã°Oؾà>êCBceù™ ¬I"¥Š¥oÔÔ.7C!Ù;ÉÜBé¤)e©î€ÒY.7ù&™íŽ}],P/“O:sûtÙõžÁsËŠN§4Ÿ1‚¶Ò±ÊÑQ­É1ÜÜâhæ«dŽ¿•럮#G79{×ïŽSÁ-ìPE<6ÀÌ]<µ‰ÙÅW<àeƒ[í8E*`>ˆ}ô‰óóÓLÓ“ƒ£‹0ˆ0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UØ«, ‹Ã’ÜÆ­j?¿óƘåÜý0Uÿ0Uÿ0ÿ0 U$0€0U 00  `†He00  *†H†÷  ‚]p¼C3À¼, )í×ZZìÙx#^CÌGzë[Va«Ùš48)Û¼dZ—É‹‹aÖ…'•~˳…^+çÄþŸdÆrÐ"a-˜h mNï.°Î0áQžä<Ø()6“öÓ&tÉÁ¾ÇÚaý8Ä¿ÙÔD;çÍÒ½‹›$Ùó;Ô?&WŒ«X >¸ú2ƒÞïŒ9%ã#V˧úWé9 4ªÊŒÊuVë@™IÒ w3õµYÌŸE¬–ìnÍË1ŸÙÎïøq°ï…²ž+•›1ª\øtºƒÔ[—¿]†PJ½@lCÆYƒ`ÿA°×Oe`©ãF_”'ÐÇ“ï€certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/RFC3280MandatoryAttributeTypesCACert.crt000066400000000000000000000017241274666402600322530ustar00rootroot000000000000000‚Ð0‚¸ `0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0“1 0 UUS10U Test Certificates 201110 ’&‰“ò,dgov1 0 ’&‰“ò,dtestcertificates10UMaryland1 0 U3451 0 U.CA0‚"0  *†H†÷ ‚0‚ ‚Ô41%0aÇüïá€,§W.Ùš‚Lª‚@_«Eô.Øns_2|¬²—¡ü‰ÙÚTH±`åì$„a>šQÍ·Lpþ‡¢öƒÌJ´vÓæMøzš'›8ÍÅ6r#š˜”ãÖ¢Lê¨"}Ü®ó"‹ýÁan%Òa ?ÞwQjz%®½ðÊɬO´mÛa­ «˜Œ¹§_ ëwr<¶ŒÞ®«6@̬[DZwá:(Ŧ­½Ÿ@ªa½©œý6©M“Ý*ÑŽÀó²ëÒi¶"ÇÏæê“)žw)]2êV‰²4;±|…3G̶ ®¿S „NÌ7²Äv‘lá/1~I £|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UðQbïÎAÇ·°gtk¼2 3™ë0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚'eY?vZ° ÏÚPhÈIïÿ8†ï Ý6²¿ œØ/»ÐÞÕ«uV H{‰Ãr‰ðŒûˆëRbfþ¤Kpl##V­. F`ÕM’/ß~1ž¦CÈV¿c®]QØTÕ 0(E4ÙU£gIDŒp-R[Ó ed 9<³>*²°&»‚— l©.§ßq.Ä^~ߥyKâ3<Cûÿ°5-°rê¿ÒþÄ´lJÈ¥+5¢UûäPråáRz*§×$pÝ–XçÈ‹¯#æ¢òÊIoÊz9c¤êˆÑJßÓg“`P¹®ESt ï Rjfd¶ÅL0ì͇á"?Š¢eƒÃ£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U›no?Чô経1[ΙK‘||½0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚úˆ0Âù¥Ku—¼ÿ‘*»e3iXö?ËÏÿ6³’¬œ‘hx·8#½Þm툞Iø-“½ cÉðG´.”‡:JmâÍWO.ø•àæò "ÕÕŠø>…:⢄…˜}8¢ö…RˆÔÁÚ¥REIfSȺÈd’̬‡èÇ1ÇGq"¼s>Z¼÷&ÿ,ßìëwUMðÑŸüÂÖx#RöÚAÍW’¥ê{‘DÈ,ö y"j#µؒjx 9(?üXSKËP>¶ÕqÓñ®2Œ¨üuö=y}—S}ruù>Ÿiq÷Ò´PZæå<»møK‚2¨h…*8‹P2óAÚW£certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/RevokedsubCACert.crt000066400000000000000000000016011274666402600266370ustar00rootroot000000000000000‚}0‚e 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0F1 0 UUS10U Test Certificates 201110U Revoked subCA0‚"0  *†H†÷ ‚0‚ ‚¥¥¢ ¬Ä½ Tõ|Ù)b^Y¹­4=è¼ùÁްÆ®!æì íe*ܶcð ¹Xo„o^É$Ñr†·¹óÓö3Š|ÇjRPÍÕ‚F¹n7êH“‘gLîL±]) 0žÎêëTbó½ÿ_uÓHûÅwØKkÒ[é ÐbìÑêˆÿQn°üPprôvÂÐäç²âÑ,xx^¨y°¤wp(äB•hj©g–Eü~F^gJãR!J»iÍÍdùLË ÎÖ£úÈÜÒþH¯Dqsí¹ _’¯1„鯀¡—ŸðI‰_ ÃWò¡DCá”[Þž™’wƒmA5Î(ù£|0z0U#0€X„$¼+R”J=¥rQõ¯:É0U–o’™ évt»_ÔøûÙÏ ï0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚‡u" þ½nÈ›žC²³¡j>c[æêÇûÒôœ§EØú#sD©PNãùÅ6H¯Â-mN}²†“ľ©}uc½ œ ¶¶Å;?Ô?–ãƒf4ˆ–ˆÐ_L\Á 4pnO^÷,n‡Pp¢ç©×œ>~ÉEAQî“zée.£¸< RÏÀQ8wûÂz[ã0æõ[ž2þõ?ÀÔ&¶‡­—¨«9ÕD®õÅæG˜Ñˆk\=‚í“ ù¬aV6€á€Œ}3,x,¸ë|© p¤ÇSN‘ü"½¤è(6ÝY{< 4FŒÿ¶ ¶.åkžíPVi͈Z¤µÉ|RolloverfromPrintableStringtoUTF8StringCACert.crt000066400000000000000000000016471274666402600344020ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚£0‚‹ c0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Rollover from PrintableString to UTF8String CA0‚"0  *†H†÷ ‚0‚ ‚¸Aéûç$óÉLi˹!’¹Ô–=‡MŸb-¶¾’ äÚPÃ00²c)ú¦n/K;J -?ú,ƒLá»P†zÉ›;ÝnÑþ>ßOÔM0ÐôLœ èAºFxHÊYMþ(XЌƽA„ ƒWÊ6')0N×±«°È&ͶO0 Òè?­ P,ð6ÍnÔüóflX|;Õf7‘¤[:ÄTÃ"¨@-ôÿÙ˜ÕcLjæt3œò¾!ÅÁËXg|éÙ×f(«¯F +-Ò̪¡ “L­šîd.Ù•DÚvTˆ{ÇŸ¡“Tœá *„D¯£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UµmO(?Ç»±˜¤©¥Ð¨[^Jt³ç0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚B)0ˆŽyLÖÍyDLaK»2Ö¤qPN8åd¥NãV¾A)£¨[šÞ‰G‘{wmöaÊkoë­2ÍÞ8!y˜¿Äú~ÂÖ<åÄäåR±ëVÿ‚Ð pãv–Ãjý›S‡/ÇŠÀµ¡ Ú´ ~Ħ|à0™SümfJŠ h6™<µÚßÒ¨Y[·ÜLQ\rnN–ŸàA/¨X3¹ö–VTÚH`&Œ¹[«ZJ#Tf†þ¥oj̆˜¿Ð*yƒƒMØ`¦tíÚOzØ€›élêoÔÃ@nDkXvË}BáF˜å>©üfÁ4õ°ˆ€Y¤Í5š9l9ªcSeparateCertificateandCRLKeysCA2CRLSigningCert.crt000066400000000000000000000016151274666402600342050ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚‰0‚q h0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA20‚"0  *†H†÷ ‚0‚ ‚Ö˜},WMì”›Ìu†Ö‹fŽ^‡ vŽc>«p;Qšöðž›Þ/‹sDl=ªš(FQˆ´Ž}¹=À{Ö˜Pr,,ìêÒöñšÎ©˜VÛýÏë=ûýÁ×iüÌt ò’¬‡ß¯¦øØÑxùâ '¹IªJ{½µ–ðSÂOÁ¸kåÞÆ’‘"ÇåH©k=gú–¿_òCôÓ{;±L9"ÐG¹}Q=ü5}™š uSÆ7jíe½F;dŽH³»GÓ=xáƒ6: Òí1QXN¯*ÈJÔYv‘cbЏâ ¸™âQÙ®n†¼ù¦Ëa¨¢Gý<£k0i0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U„=„ª|w_1ÝÍ`ó——Ù±0U 00  `†He00Uÿ0  *†H†÷  ‚„›ii˱™Á÷–ª¤u‚°R‰;‘ ²£1ÕÏÑŠSüÖù·ö$å3ô¡ô²3Œ7pþÃ"gÒ„J…˦Oo £fGtòÕWäqoÌ#½guÍ®¨Fï½59 7^CKûhbܬϬO­è¶ùõÉÆyÍÌ×åP×Yf¤¸õwC•ò'¢…\o«êÇðÝšÿâWWðê8#Æ–?w Þ‚æ  ñQ‡r›À‰ŸAÜÎlåhjÂMÕ[´Î>@QÞ&º°>ü½oò,Òá^°0âOñÜ:Ì’ᥭòhá0e¢Uq+]wpeHSöDƃÖíÖ©ÈSeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt000066400000000000000000000016361274666402600362160ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚š0‚‚ g0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA20‚"0  *†H†÷ ‚0‚ ‚ÅbÆõkìÖÉœPµf¥?šµ l3^¼1šf{‹ÌŒ˜©Ëyi,¦!êœ3–Ñ¡ßÃkF‡í_#M(E[2Õ{{¶=y¶ðOãòp7½±¾ÿ5rY€~7;¤ó‡ZÑ i£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U8£8ŽNEö¢â@g›tà0U 00  `†He00Uÿ0ÿ0Uÿ0  *†H†÷  ‚@KçÈÑŸ0Ì’Å  ´Nl*;}9¶å•%AD`áR†,jJ Y]2P”^:Ã*û¿Oñ¾œäó¶b0ѬÀÏæ ÈÐ3Ü€ÒúÆ-»âw®U vwW¤™17B±|ùÉ8Õb#† ³ù¸–Ycúg††AZƒáyRfêg|†ún‰ÁVN0f_ÍQyQòšõ¹ÄŸÈ´B#èÆß—ŸêÁ@½H¦JLEí:1r˜ÚÎ, Þ(®”®ÓþG7¿× 8Ùu,{%À_m´£³E§z·«¢ôÆ£(XGOÌåyËjÀ l‚9Lù& Qÿo…»tn|L certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt000066400000000000000000000016151274666402600337760ustar00rootroot000000000000000‚‰0‚q f0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA10‚"0  *†H†÷ ‚0‚ ‚­ÜHs£y0fâV¹6æ™°«nÿºÁfô?àGT'»³¬IÜONůÆ[!§ˆù,<6™È"àeQwtÓ"õÒ+›˜›‰rÜ?id¡T÷p2P–þø EÚó>ùÜ{Æ—Äíçòmñm~¿æ^躦dûGP ]ÊSv‹› †] -i`(E¿Âܧ}#wŒª€×&þž lIhã\@u˱Ái·"hÚ@pÔ«}ÈAt&:BËx¡Æä†/Spl˜?E*;4¢{·ÈUÏtütawí‰Àb9ØJMÃG˜¶U—;ç/;Œn¾‰öÆ*ÐVþ%צäeū˶/a£k0i0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UrŠC [==ÄUáƒÆŸßÊê÷^0U 00  `†He00Uÿ0  *†H†÷  ‚!ôÁâuã-Ü4FzHÀö.]»b·Õ0í(Õi=VÂfLñÐþP7šj!» ùŠRÃÿM†i=L@/­þÆ'~ =³ˆåÏ…åߤ¢æK;›q¶w~@¥/âiå‡X_ Ž±ÓˆÄY£ 6Ð0—‡;»ÆXó¥(§ õ)Ñ[”“ªrè‚íZJS{àÕ•2Ÿ/‘ÉvÍ4îs¶êÿpËk³%[lêÜ{ bØ’ ¶e§žyŠÆ´w[¥MuþVùÁ-çcê*½íßÓÙú4ÅpV[„ª|0;}Ú;xï¯ò)T9²©ZÛázA›…¬^h Ô©EÉ|³ërjYÿ>ã7lSeparateCertificateandCRLKeysCertificateSigningCACert.crt000066400000000000000000000016361274666402600357300ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚š0‚‚ e0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA10‚"0  *†H†÷ ‚0‚ ‚Ð ;KÓÌ2ÚPê+½Ù­ûâ}]KÌ %9Ap($z˜]¸¬¸-N”JKrÕ¨Ð0•¨f Ö¯ì8UçÍJKýä· 8 =òýäB~iû¸¬‚û’ÏÜ/jaR³P!^RÞyWÚ=Û÷ÇáܾòV½‹²wÜs^ˆ“ñOÈvá5f3äË3ÑÌ:3Uhò‘¯±C«u”6tTóc-åó n-A·í0`ûo?Ùô‡­&»˜sÁfõ¥¦ô#Zˆv$kV¡2¯‰Só> ÍP"|Ë‚4Òi(³êz´D=€  Ë€YË:¦>+<Í_BËõ ã@Øí£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UðeÚ?ZÞÕ¶H™;×L¤0U 00  `†He00Uÿ0ÿ0Uÿ0  *†H†÷  ‚FJ‘BJV¤Ô±Ïõêi;Æ¡&öT…=Ÿ6ø¢8YΑè(¢âC¯á^Ü@ÏŽËŠ!Y%cæÓÍîØï:am&‚Ì$ˆ©öÒ|³["Š4Æ`[è:žBPþ,ôJ7X'ÿ9g+b¡ )@›‘˜Õâ,ö_«V¥àðÄÄ+ùºø+nÂ"&\$© Ëï ¬õ at†+b­º‰ª~aAVj®|(væ#|¨þ¡œÌÁër+וÌs")ÓYMÝÁLž òL}{£´4µôÈøÜ%m¹>}söÜvÔ`uÊàrƒÆT *ÄÇQ•Ô¼òO2T/q ’certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/TrustAnchorRootCertificate.crt000066400000000000000000000015131274666402600307710ustar00rootroot000000000000000‚G0‚/ 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0E1 0 UUS10U Test Certificates 201110U Trust Anchor0‚"0  *†H†÷ ‚0‚ ‚¹™Q‰GàÍE¹„'‚ÍD9ª¬Û ÃÞâ,NÛ¤WŸ”5(5Âkdö[ mÿ'ãŠ#cΚéÅ \¨†XŒ”•µÉÔ€Ö±^¸e¾:ÏX âÔåH°M«Ö.>‹ºŠñÆÂµøØm\1rêŸZc&ÛN<œ.Ï¡£WösÁk*Z£°Æáá²!è ³VÚjZQþYÍ")«ïþÝÉá¹ðã¿2æX>s !³ øŸ‡A35 î „Ñ{fÒ®)&uyÌóµpý5IPl7/:K –³Ïra•Ÿý¥|Åcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/TwoCRLsCACert.crt000066400000000000000000000016041274666402600260260ustar00rootroot000000000000000‚€0‚h  0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0D1 0 UUS10U Test Certificates 201110U Two CRLs CA0‚"0  *†H†÷ ‚0‚ ‚½UpÞb ¼oH ÍŒiZBŒÒÍêôÒÐÅ÷æF¸]Cˆ¸ÉËw4Ï¢^\IÞ¿âÉŽ1r™h P"¡Ï®hZßjÜ ð0â _ÎP§ C¿`FŒo‡CË"|8âÄn ÚnÜ}ü_Âèzس·Æéyö*^ +”÷}1×7F¡¸öe5w'΀C†m¯oaöµþ8ëç0®háb#yˆ5"Ÿ!mÕ7¼‘v3{zlèlg›Í’ôW3\K#¬ÿF’v¦¬Ú7ב›&ƒ»[¿Ñºþm)ô5Ýžµ¨çjvãBnÉ mTøä"„Ï&æ¾YÊ£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U¡Ö™€ãmýçîwK_ñIÙÆ”ZPgùæä•±ž¨]…&ÐC͆‚ë‹n9°W©ÖxkÁ~Òl´­í]žÝ¨¢`z‚¶«mÔ^cG8¯hz#@å O˜Zg/ZõÐiÄúŸë×K$ji° ÜV¨“€ð6a¨>&þx4ã(~¨Ð¾éâ—ŒÒ_ÚqQä,ÛÇ™”àŽ¼ý!þ8Àt…›#‚˜˜*ÛñRnÛ–IRթʪ±Çj¤al‰|0vcˆ¯•ü©<óóMmn5Ïr\5ͬ¥certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/UTF8StringEncodedNamesCACert.crt000066400000000000000000000016061274666402600307160ustar00rootroot000000000000000‚‚0‚j b0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0F1 0 UUS10U Test Certificates 201110U UTF8String CA0‚"0  *†H†÷ ‚0‚ ‚éÇhpØfÇÿ&^>ÜšDÌš°ãõµÓGPd͈ý÷yûZ÷@…±› }‘vÐ'ŽT‰ªL¨á†B—|Ä\å3£-þ+q 1ÿ#b¦¹7ìÈ`q!Yí0eŸ3åå«/"e‰8Çfrs—ZîÌì:{ºÞ£uæ@ Eþj-42VïªI¬ä _HJ¸Õ(ûQm©º¦xÑö×ÛLòÁlL‡—ݵŽ(œ•ð‹Í,ÈÙÜ+ÖªÑ.z>– Çc¤ï¾î߆¡IÇ÷¨y`±5þ½D ˆGG’/Ú'Å0н—fu=|N6.Éêÿ̰RÆR­£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U;g[Dò §H}s)Œ“ŸÕ$ã`&0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚þKÒ¥ö‡¸†:èúH9ä«2†¢©ZªÉIíþèQÔÁR†Ç¨q“_-P`‘âºüšK>Ÿ‚Ü| ­zþÞý–Oåú_Ô%%mѦ¢Â!ÁŸk‰4-ÒË †«·c7Égþìã¬V«Á,ee!ð¢‰'`Ê$ÄÊஂè2F°Ë˜H̲( ÅkIt!êþT±.{Þ×~–¸b¾OÑ z2¼ÅH‚žã%@0×–#µúnÐÒtE›.äÛµ×lCÌ.eGÜ£—œ_-~XõQ Ï]C û×­È”(éËNýo\?t:”ÒõŒ§_ ¸T*‘D„ˆ¶u’l²/­3ƒæ+Ucertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/UnknownCRLEntryExtensionCACert.crt000066400000000000000000000016271274666402600314550ustar00rootroot000000000000000‚“0‚{  0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0W1 0 UUS10U Test Certificates 20111'0%UUnknown CRL Entry Extension CA0‚"0  *†H†÷ ‚0‚ ‚š¶MXÆ!÷‚Е\èÆp ‚q Tn ô 86¿45ÞWMªƒ.0´§†÷³¸§/Í-Ü>¶Ø‘×fõA¬66™ßs’ EÓ<¢c͵¿Ÿ7Û$¨˜½SòA ì\¶íÅž¨¶Æa{+¦¯Àlvq°ý Ý.ù!`dP­ôÉ'ûáþ¸åìˆyâC²çî”Êpia€°ÌÄbNI¿[¢~Š|nÏǃ”Ø‚Nîõ¨Þ"+`Op¡ãª¼<%Ú“æ¥éw±)ÜŸbM¤RÝ\Û¨o¿]"[gáF,z¼œÂý.Ev °Zlp§£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U¦Ë¡-M(/"óÒL7ÏÿL0Íê0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ŸåU¯.¼ìH¬’³——}ðÖ°SÛòT•&gÂÎ!F]Ó~·RÈÝ ýðU«4¹ó×K‚íaì”ZNåCãÝ¢F“Àjöß·óóæ³§M¢‰&nù]{Bhƒ°©Í-Z½;"¸ê|ÌæhׄP=IÔ{T¥5;ëýŒ0Nò+ʲ#R7âÐwî-I8B·qO”5vƒ#?._ªÕÿ[®¿…¡ãÜk¾ã÷±Îºë†—ÄÖš:˜ÃÄ£Ð-#†œ¨­vº¶K¤8L&¬´^–Ú ;-áÌ £§f°ý\:7³3V»pÕ^¿ˆï¢m?^F)a38certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/UnknownCRLExtensionCACert.crt000066400000000000000000000016211274666402600304250ustar00rootroot000000000000000‚0‚u  0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UUnknown CRL Extension CA0‚"0  *†H†÷ ‚0‚ ‚ÝþniS±€U’ñÕ\Ð>H }ój‹Œ†@½®Ðù\m»icyJ]Õ‘|ÜÔÀ™ê‰)ë¼’¢r˜£l´­â¸vUYkÀ1Ø’þDv™*&Ÿ/ˆÐÛ=P9*%Bp+ЉONõYûoÙYí:éѬäS@јä½aPL[ØoÙ‹RH“ûDÈm±]xÇrKš†XÛ–%6§[¤.æ›4Dj~ò»ù¦f•»c™õ ¢ä‡0›Gêyèµ,£ƒÔD–bæ*ÌÜÿÒ$põTp‰+óšÕrä“];.‰ƒ„1zb«Xj‘Ί¬èålÓ° éᶦ¥ º¸ÿˆýC‚¶âU£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UýÿþMÛ Å¢Ø‚Vë°Ùaã10Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚8ÆD©éJÕ²Ùª67Ÿâ¾ßóKqBeY¢Œ‚WdÁ¯PÚéå'O—×ÿ#D™"k3ŒìXê»Pžc)Ÿ¬ýëÌxØ©´%¹ëOÝŒD@«_µäœMÞ„ê›mgß›•)EB¢÷D”_—ËCoL—ÙSSH8uù³jãËÄV&¶ Nùâ A?M‚Žà¶ i®âäÓ6vÚÕ†ñ±žòø^ˆŠx>N|Ik-ì” Ф—˜è)—Ž”g–»8{ÆYéÅURæ‡çÐøâ Þ7¤’Çè¡°WÇÍéF~¸õ´i…¡å_Q@ìbøN+Œ›ª[ücertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/UserNoticeQualifierTest15EE.crt000066400000000000000000000020021274666402600306420ustar00rootroot000000000000000‚þ0‚æ (0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+User Notice Qualifier EE Certificate Test150‚"0  *†H†÷ ‚0‚ ‚¤KÉÑü K3­Á<€sñÈdµ­ ÄM—ƒød‘|÷vìû%WJ»KcI!¿F'ÒÖS¾}¸yŒÁ¥aeµ·@ÉÝÚ“ê¼&‹Æi ´¹Ïô çnìésÇUc-b®+Ðôe2Gýt§¹Ù&Ä-”SØoF:v)£^·Øåšíò‘OÚ¿U  ³¨'ÿü…taÜÖž#§?Þ/ÙäÃÛ«x"™ùìûÇT-8ðßÉ+è³Ð§_eÅcë–¡0I¡Y”AÎ}j.èVr»qÂ6¥³\_›!TmÓ„Úg¥hbê<«÷p’»)ÔXÆß`ESWžØH?EdôÉè!˜Ù4J U%I½&DzÅË cP‡Ø7VtÚr@"Áó®O5òé6m8©— L`W˦nxÛ“C÷Qç…¦aÿÜ­/\NѺývÜ*ÐCXÁ OðZü¸^n‹FÕ…a×xßF~¤î 0„PvFâ—¬…h±„˜Âs©V©ƒ¬È¯VòÚ©J3‚Åúcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/UserNoticeQualifierTest16EE.crt000066400000000000000000000021711274666402600306520ustar00rootroot000000000000000‚u0‚] 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+User Notice Qualifier EE Certificate Test160‚"0  *†H†÷ ‚0‚ ‚ºVÞ¾Îî÷iÌœ ¯ÚŠp>|i¡«\(Sá¾zŽ]ç §³&}(.0ÍïݺœÙ1äjßÿ\÷óÀ‹½CºÛób“³Ã—\åe/% ¹„#¡‘À¨{Ìòá€?.î;¶]½ß®A!\ +j@ýÚå¦4+-tG –âEëé2ø…{³:Ö ¤˜D ŠßK ƃ9ïæ ®~üŸ¨/’¯ÑèAwÒÜXûø›šÝcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/UserNoticeQualifierTest18EE.crt000066400000000000000000000023301274666402600306510ustar00rootroot000000000000000‚Ô0‚¼ 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UPolicies P12 CA0 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+User Notice Qualifier EE Certificate Test180‚"0  *†H†÷ ‚0‚ ‚¼ðB²»ÐH&|  hL”|‘Ô:M>¹!àC¾Mtx5•`£^=ì)üÐMî£(PªN"†K:`8_Dd_dÙ¦O·ÌÃ]Boèì´Ü·ûbC—yËg¿"y$f2MV¥qr›| Ò`VI̹…$æJƒþçþ/Ëx žâ= ” ‚ÅÆk‹ÍV—8tb¬9SAPf‡ÒrdäI8Õ…rûñ u¹÷󩪾Õ}rN˜Stz55·VeÒãŒW¶Sv/Ø1RUoöùÒà‚“òW´Q‡•\øç„þø7œÜ_é±r 3F%|ßÑc-K+—V¤õk£øFÎ £‚«0‚§0U#0€Ø_5âšÁ7*&΃Ìsp*:â10Uà;ò“¨æŒ* vk ohq0Uÿð0‚SU ‚J0‚F0 `†He00Ž0‹+0}q4: This is the user notice from qualifier 4 associated with NIST-test-policy-1. This certificate is for test purposes only0£U 0š0—+0Їq5: This is the user notice from qualifier 5 associated with anyPolicy. This user notice should be associated with NIST-test-policy-20  *†H†÷  ‚ƒ6]I¼àÆ?æ9±o¼I'O\(/à›?ÇjÜ\lÑg dÌ䨘Hì¡°ásêé×™ /±ôÇ'`¦ÂÞür„¯º¸.{¦*¼8׿9ŒÏpšö$Êñ¶›pç–žŽÙ=Ô£E~—¬Iõ-F0hùŠàåŽF{ÒdT· >Òòz-0×O+öd·~PÊbë?ý¬39ì\á÷Ûì{lø.{¡aK>'k؉BŒòœKÔtŠEo›a5Ù–+Ÿaºvn¥¥DGÈY6rY!@¶#{rOvL¦lvvý͸){çÄ»;wœ^7ê ßR†8Tcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/UserNoticeQualifierTest19EE.crt000066400000000000000000000023571274666402600306630ustar00rootroot000000000000000‚ë0‚Ó )0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+User Notice Qualifier EE Certificate Test190‚"0  *†H†÷ ‚0‚ ‚÷ó™ Ö¸EÂ%ËX¶ÿ(ƒ@µiIFDD|~j,µè^…äu7Ê £3î7­•<ªµ¡µ1'ín\QhgºñßÖIË•‡¢¨~ÿB•GÍ™C¡EÐÀWlp®‰xiº ô:±â…w,äØŒÿ¼u裊A±r>+†ü-é=̈˜œ×äöó–„ôDqº¤Ê‹O‡îùå Ú¾ó§+î¥ðG ž´²)™ÝÓh6iT[AÃ{Á˜&ùûâT®ê·Þq£b….r¯-j©iQ/”:¬Ñã\ÿ[@·ì;«NN ÎàÒñоH*G ¼Š+ðaI£‚Å0‚Á0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U M “;‘àÏà'×7[~é›0Uÿð0‚mU ‚d0‚`0‚\ `†He00‚L0‚H+0‚:‚6q6: Section 4.2.1.5 of RFC 3280 states the maximum size of explicitText is 200 characters, but warns that some non-conforming CAs exceed this limit. Thus RFC 3280 states that certificate users SHOULD gracefully handle explicitText with more than 200 characters. This explicitText is over 200 characters long0  *†H†÷  ‚k, ¾¹dûdg%D‰ïaH å/I2‰z»Žu©éÀÃUï~m-*­X,ëHeX­mX'Lß亜 ¯¥=RÄåu…Lvw!cóñfK´•Êê5dŒ•<Åyš)b>Ø0¥Ù±GýÓRc)kï›7dÛ›‡PÆ< æóyÅé®¶Ü;!˜R@ìûñ¹½Ø¤S”!Ïâí®nMuð»öP+¬ °Hî—˜¢3L•àqΖ ùÄšXÏQÛëÍ!içyå¿Øs~†cé›D½¸;ðpƒ AÍÞ­|”3k„Ú% PðÐSQâø} ì ‹K(certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt000066400000000000000000000016741274666402600331770ustar00rootroot000000000000000‚¸0‚  0  *†H†÷  0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA0 100101083000Z 301231083000Z0u1 0 UUS10U Test Certificates 20111E0CUÌÂi*,Šžîdò²›Ô÷Ö·lå-Qøÿa³ï½V$[‰Œ2ÕG üC€–RH/šØÆÜ¬"GLlÌn±¡  R°¯w”…íýŠ)æ«veØÛ­Ì*u,(?Jàý´ãõ5ë’'#NºGçò#š”ƒòFBñ£k0i0U#0€)šE.6•ìò^TœÕÙöD‘,0U2½°m`idvy5í8r¥¿ï=0Uÿð0U 00  `†He00  *†H†÷  ‚'ÕÁfï¤×DקΪN ŠF‰ùÈ˳{TF"ª;!nÕ!÷ù?Eš‰ÐÚ·»iyåߦMãDè HbƒNitz”€0—êgL€?±CÁŒÅ$i”;Ù¾¶Cþ¸åª0µŽ» ÊNÈ廢Ϩÿ¿çã#½Å?€‹8Æ '÷½©0ôF¥ «‘&ºO%Üâ}Ÿî5ËO»7_†X¿'±Ža4õI¬8šm@8ü¶¾;ˆH Þµ<ËKîÒ„Ôãç´‹ß®ÑÐõ«Ì&;êt`¹;VóñüØk%ϼ£×— MÖ'ZÄ H±‘‘™WGÄà»Y¥Ucertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt000066400000000000000000000016611274666402600326040ustar00rootroot000000000000000‚­0‚• 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA0 100101083000Z 301231083000Z0r1 0 UUS10U Test Certificates 20111B0@U9Valid Basic Self-Issued New With Old EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚¯Ññåúo²gòÅœ€»âU¹¹dl’dÒp•žg~Bìê•bÉŸ¢wÖCZDùPZýÝÛéX³Ó#E \nt @8•‚Dó·äÚ\ˆy=ÃimowªØ×N²Ø—nO]sêáº×IŸï¼F¨ ]cdDÊÖ½U=ÎÛL-äËË=*¥Ö©$Ržß ÿ®øÇ!Ü7мÄ=ïHjt2~ðÝÒä‹m“§Í™.uWák@ÌÒ\YFpÍ}hc¡Ÿéò^¸”û²_T—·ÈmI´ îQꃥº »_¨ÿÖ|ÞˆÜpˆMðü®½°hï^Â{Уk0i0U#0€ˆ_¾?59fšëMÂ&&±*'µ*0U&ê¢g´b¿¿ÔÌýdÛˆÒo'‹ë0Uÿð0U 00  `†He00  *†H†÷  ‚3âç\ÆV¯í”Ì+ÌðÏKZRY!ÊYM0̲* X÷3ï2=OhT¬»ë!“+I•=oêS>ªIóø:¡’)Ó ]° O` tÔžð™Ó#]Ù°èå~éî³P:)rŸóž}oz`ÄÁöÉhY.˜/lX†Í­U¼À§°CNHÇŸ<9º9"Źª¾¿B~‰‰w‚à‡ÍóL7O&mŠ&`,Œè¨¿a(ë"U§íxú›ßÖKÍÚq¹¼ÇØèžÿ³×‰¶œ 7‡¢0ÅÕ¡ÿoo’ßi׌¶{30*­3œû$or[¦þk¯Ñ&U£a„†§®GnÞ„çf— Ucertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt000066400000000000000000000016611274666402600326050ustar00rootroot000000000000000‚­0‚• 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA0 100101083000Z 301231083000Z0r1 0 UUS10U Test Certificates 20111B0@U9Valid Basic Self-Issued New With Old EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚µ†êE$„~|ñÇmÿ*»½ëOØçö­è•ªÍ.ë³\LÜü õgNš‘ÄÖØ+‚sރ‹q4ÆuîÌÚÆàsY Cóo¾eA®:Ì£íTæš{žvÚËÝc`tJNÇ#Z{//JŠÃ{û–ÓR7’…5çÏVd#ðÂÍ]°ûbÞcn|£Ñ¼›áÙ7»ecNô»a¦““ɧ•EuäÀßc¶n.sêäC÷'D £Ê¬¤dÝ?Èè‘þüòu™­ºœñáX+ÙÅ™&‘BÏoì ·ó5h׋ºŠñ™AŒû–f¦Fª"ON•$œgz(Ö…ŸtAi£k0i0U#0€Ý uShÄË@À†0¡¾¯0UtÄEóì50o“„Q—S‰H0Uÿð0U 00  `†He00  *†H†÷  ‚‰Jœ%œ+oª¥ÚAÃB`.G÷ÑcléÉ¢G‘‡"ôËÎZ ~!Œž/`ñ¡’øï·çìÔ²ryü™½|ö  ߘ+Ãy¿¢šÖ %®£™Œ[j#¯0¢Â±­ ƇåI2D(Ò…ÄtÏã…­çd§½½¯2—cÓì—ˆ»m#\L”v-@B‰L"¬ÛÒ \µ$Ä4‡ó,ŒƒlD¨dk XëêÆW簾kÕí+™•Í®L^í}¼s†¶Ýþùr¯þ¡0*—ïHeQ5¥„ÿ>À{ˆŠ¹ÙÙOðV|öÓd­b^T´ÎÅÌÀ5-é­¼íÛç_v‚=ÖD|certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt000066400000000000000000000016611274666402600326020ustar00rootroot000000000000000‚­0‚• 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued New Key CA0 100101083000Z 301231083000Z0r1 0 UUS10U Test Certificates 20111B0@U9Valid Basic Self-Issued Old With New EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚Þ¿D-€2_¼÷Ï †µèê€I0 9·©á(¯~ éSâpš³ÿ§Qú½1¤g¤ix}ÅÓ¸Zž¡s•‰¯Þ†›€& ˜0@ÄArÕÊmN! ÛQš«»]îÿ8sèTwžCHù‘0™¶öæãŽp¥BrMÂ1L‡$¥.ã¤È¸ÎB Kkõîp$>·àcÎ7 ~Ù ›+ÐÆQ$7cÇ¥Ú0m×­29[põÙÀy…åFô‹j·iÁ„¿ï“s%–ŠÒþã4˜Cû’–ëH¹]\{›id}D{Jjöÿ2¢@8héD§ex‚™¶ú£k0i0U#0€v|Ød4 Oßq!t ›6¨‚×0Uݨä"÷=‚”KCw.ÄÏ'æÿC0Uÿð0U 00  `†He00  *†H†÷  ‚ qþv{ß8 ¿î„e$gª;!l œ¼á\¸êë¢ /fþ‹€ÕuÌB†~·°yn·ì~ü/×VBÿöÙŸÿg%C|ÏõoÄ|'”Ù¾gH˜rZòªìæ[Ö å4míeãeïµü®‘¥ÂœÕ&Å$}÷roQgÌwtAG'ZŠúòr¼@]ÿ[@«‰ãS““úp_ ¿á]ƒÝ6媲WfgCú4‰÷wKŸæúx­¬ýXàç ¦FŒ  Ì6S«€·ÜóÉá|†l²¢´¬K ÝjÉ[ætÁŸK?râ­´/Ga —q¦E,PCƒœƒ}†FIj dëecertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidCertificatePathTest1EE.crt000066400000000000000000000015751274666402600306700ustar00rootroot000000000000000‚y0‚a 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UValid EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚ÙÜw`Aûçxø„wpï-nU;¦™R?mô½¡—ú6nDBÈSþu†›^7ˆ¢}ÙqÔI5qÎFÏ[ÐYŽeëB=ÊÜLØTiÏ^8² `݃Q.ßÛÕ[8‘Z-Ïš3´o–åvbCi„ÏTAù5êžÔZ—^Y½àäÃY‰×Þòy°‡kÀY¡*‚okS4t=ôáÌVb¢äeè#±ƒXS²3-–¾å}3žZ'sSÝ]˜âKSX‘êrì»”ò P­òµ$1彪$±¬Ý Rð‹j«¸÷íßc´Î”h¿^–ÐD–ñøôz: yS£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0U¨< göØGº¢ÐürVˆ@m••0Uÿð0U 00  `†He00  *†H†÷  ‚ZÙ¯b¥¹R¼¼ì aˆª  G£ž©²ø£Ù,Ò8¾;²ÏÔ1ˆÏÎiôŽÇ¹pQÀ‡Æ•´öjú1ž-ijíåzanŒÑäÚ›mlî,ÑyX؄͛AÓâþ‘Æ_'e{ú/½¨¿4Ž-ÏLX[0.ifE&&!˜Óó®)‡ZNƽè(~ ”æÿ\µ\OÝŠaYÒÿÅiÀÓ‰JÑÂåÈôÈÃý*#O„\,D-ƒŠÂ="Ç<`òŠxãFeÚ™øcÁÔz p¦z§›¬¾ðD#‡X¬èó ¿%Ë6«iZ®ÿÀn°Cžž<§0nÂcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNSnameConstraintsTest30EE.crt000066400000000000000000000017201274666402600314200ustar00rootroot000000000000000‚Ì0‚´ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS1 CA0 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Valid DNS nameConstraints EE Certificate Test300‚"0  *†H†÷ ‚0‚ ‚ÄÝçÄNL†1{NÏŠì“×#_>nO >h㦸;õ‚KÏ¥XÔ$y½²ØGjh¬ÓÚ6x¼+`¼D)H‹F;z+¦„ÍÇö ìf~¹>é=ý4 †šµ<èNF©yűUúnT‚XÔ•èßÜ'j€ƒz5ý¢NƒÎì]m*í{÷@¥Û›9QÁTwñ ÒFM¯àHqž«ö™Wðýà„qþÿÑ~)B‡±Všºîý ßà¹Ñ4F3bnóéòáû6[Í6–ø[B¥³XЧc™=Uø¨ÉwHŒð}”y…°º«Ú&>N†o<äù9\Ûz PýJß?† £˜0•0U#0€±ªðãÏÌÒ§‰¦ƒÝÿnÚãI0UE’Ïo“µn6‚飡ÄA:q°r 0Uÿð0U 00  `†He00*U#0!‚testserver.testcertificates.gov0  *†H†÷  ‚¦ ŒH¼oyŒâú{e­×‡.ä´`‰”¾Oϯñ&&O/"dåJómp¨£š`÷ÛÓZ_Ùì„·9âV_ªô1XÞ;[¦÷‹â™Œ‘4Åq ‹„Ç>ktF ÝŠÁOÛO|$T#w>y¥n €mº“n¶3& m{eS¢@JU­ÑaFrk\©Ù8k™F·qr2/‹º‚ª–l«_=ÙÆõÐc´F!Ëõ÷Þ(il%Å2ÎÞæJ˜kŠD’"q',ø*… ï|˜iÇ¥i`!±È«ôv·¡œ^¬+߉.²jŸdÌ2”¹;d&Ëöå|î1§úz&|EFáƒcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNSnameConstraintsTest32EE.crt000066400000000000000000000017201274666402600314220ustar00rootroot000000000000000‚Ì0‚´ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS2 CA0 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Valid DNS nameConstraints EE Certificate Test320‚"0  *†H†÷ ‚0‚ ‚ã;}P»X'#ȸөîÎî¬ÊÕôMy…¯/¶’æÛ,þKŒ wµ… :î ýþ¼½>ß퇭Ÿ\1ÿ°TfŠ,Ü×ßvô¶ˆ £ÒÏL¤e»G9š‹m¾Ý ?g¸JñM¤vÇÜFÖJâq†SÊ7‚=_Ñu°>o’æ‡Á #QbÀÇsÔ†kq»y£";Œæ,¼ýö2_ìBkÊA¤Øo¿d"b­wA(‘Ï¥ZÕ+ˆƒò98줻u@—iìVôwº.<+E ÐDÇ[A³êÆ÷ •Ž‚Út˜Bé$CkuRÉz ÛlDŒ4Ï¥ó·©O¼¹Û¤óñ·ù~íu¹¾L«Ù²#ÆÀ!2°`Ñøä¯ú¹¨cT͇Ï<4sC Ü_ƒÓñ?Œ& fH k80¦ZNý1‘·ríÒp×]å*“ؾ™fšÇâaÔŸQyׇ^Ê„-‘<÷Yïd7e\wK²‰D¹^ªK†certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNandRFC822nameConstraintsTest27EE.crt000066400000000000000000000020241274666402600325530ustar00rootroot000000000000000‚0‚ø 0  *†H†÷  0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA30 100101083000Z 301231083000Z0Ž1 0 UUS10U Test Certificates 201110U permittedSubtree11B0@U9Valid DN and RFC822 nameConstraints EE Certificate Test270‚"0  *†H†÷ ‚0‚ ‚ጠ¥®ˆÖÎ^ÊÙt‰ƒhü£÷á$«$„w%P]#Åm,îlD'‡×ªz NÛ ñ‹’Ö‡ÝÌ><†3,¬ÍÀ ¦ZjІHmQO €x¬U¶|©¾Ž5¦<Üa-g$@÷\IØÓŠG/7€/Ðz¤gîA¶Ÿ¶çü³(º‰Ô›'°6Ó!£¯úk Úm]^\ø‡H`ààS¦Râkì.¦yÙiÍQ—åÒd`·HÄ2}X:bך:B’-[öÆ&zº‰Û4 A"“’lldR̳Y%¸‹W™B sÊ?ÆCÜŠ´“žAlu’8øc búNO£–0“0U#0€'IäÙEúl˜”lüí Ã$RmUD0UÑL€FÊ=Ç>7cNËk35ä½Ãx¤0Uÿð0U 00  `†He00(U!0Test27EE@testcertificates.gov0  *†H†÷  ‚y+—B_ŸŽåÙ |³4°J ¢ÆHJB¹A&Çä<Ç6²yúÖ5E åo/É®8¿aHÓÁˆáÁ6uÂöl©£^ô#‘c.o V%©v†9~~´ä0g©ŸHÀÌ”÷¿L6ÂUSóóM©j²U2ÛŒè²ãa¡Ñõ •ÍÙL~Xã;ø TÜ[…§t¾H¨Äã‘H -3úæãðÍA%½ªtƒ¤Öý´³)ü¯Ö­ˆßþHÀJR}T{+ሾ1J3¨|­™# ~iBÚå&én°‹íÚ×=ìÚ\¿b‰Iæ|Ö7¡{±EjWðà;eȯ+ 梜yÙ³ŸjÇ– certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest11EE.crt000066400000000000000000000017311274666402600312760ustar00rootroot000000000000000‚Õ0‚½ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN5 CA0 100101083000Z 301231083000Z0Ÿ1 0 UUS10U Test Certificates 201110U permittedSubtree110U permittedSubtree21705U.Valid DN nameConstraints EE Certificate Test110‚"0  *†H†÷ ‚0‚ ‚ÓVŒ>›­õÓm€ úà¹ä¥AÚ}A‘·M6œŽ®¯^í‡&Ñâ!€¥r ·)Áä­M-xèLÜà¸ÝF¢‡çRëÿ¤ }{òÈ™~°#lnÏ y²_UÒÖv)w ÞB¸<ãü$˜;I/Rß_ŒE†HÉËa»øCRœ¯i-+B&$k9M–1)‹…jÈíx£ ²c›¦-”7¨·=¬©ŽæÇÒ«ª¤ÝÕ=h» †RHTë»h)gb0WÒ˜‰¥dDŠi¹±Æ4Èi©/GEס L‘ ü¡9]ñ8Ž0V#C8E t«¶]ºé°ayö‚ û÷£k0i0U#0€ºŸ Ê9œNwZëû•¬Ó§J]'0UËf9 ê³ÁØ$K¨¿Ëi(4 ¤0Uÿð0U 00  `†He00  *†H†÷  ‚Êg ½kFí|,.Ôc œˆÝ ½“Z¹ò*#îc¦#tè0ÔÀa-7¬Xr,LkPÙÀ†"¼\ô¹.› ž¤×#k/¨Âù¤A•öÜ ¢ùÔ[Å·w Ã©´VK«o™Ww׊IrpWݾðò¨g‡Žþ Nk¯eç5"¦-Á€mÛó,ì;¼nï¨ K@Ç@çµeIªÇ¯ :Ñ^X,ùÿŸ6)†€…·]SÌ#ÇdHßoEanøg×~Trú§á|¸nñ{ðó'ëç~aÒ‰e3§MÜæ’ <0ßð½¾WXtމN8 =Scertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest14EE.crt000066400000000000000000000016361274666402600313050ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA20 100101083000Z 301231083000Z00‚"0  *†H†÷ ‚0‚ ‚Òøâ4ò®ÐW¢qª®YFe~ªN žFæjwF®–× Õ:f„´„Ö˜$6ÙVˆ"îþ!¢£r¡M,»ä[&æ ‡ˆþâ8¤Z‚»Ò'éIl>c¶RÜ0п wH÷n'½ì¡Þ‹Ø©a¦mM@ýD=‚)'R‰ò8ïe9ÊÛO+\´Ïf‰š`Š}—…ª ,‡UÜ©ëc5µ‚èzÄò““®Æ 9Dr• à´›Á­OBóᆠ“P`z’CÆ ê£%y=õÖ ¯‘£~.·Í"¬ËÛ±*…ÞcÔZM{j·ÂynKöhÒÄ~±ß¼ÔÈ”ß;…øÂ%1=‹Ížøø±_£¯0¬0U#0€¢/Xƒ[L•—·îö‡´—àà—0U_.•0ñL.€~óê­]y¢ð8·0Uÿð0U 00  `†He00AUÿ7053ValidDNnameConstraintsTest14EE@testcertificates.gov0  *†H†÷  ‚ÍôOIâ ÜöŒIN`¸¹È‚Ò€çÍ£Âøª¨Ê<†™–ì/†ÎŽ›÷ùï¿w’ä$ãÖò‚ߥ&ÀèœBŠ`ø/Hçæc w|Pû¼ÒþçR@uË3dï€ÓšÍ·?ˆ¨·³tFÀè²}…»Š¾ï°ÝwIbŸt]ø%[ZWX‚¼3 ðx_ßP >ÎaÚ¡‡+±„žlI:°BT ‹Êë!\l®‹îä£4ÉÀǰ2dѺ‘…I ªàî—¡<ÔA= æCM*ï ÔA̧ô¯mÁ`"Î5½ Û›ð½0³+mÉ¥ÉöN3#¸Çã‹›×|æá7㟠¸UEcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest18EE.crt000066400000000000000000000016441274666402600313100ustar00rootroot000000000000000‚ 0‚ˆ 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints DN3 subCA20 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Valid DN nameConstraints EE Certificate Test180‚"0  *†H†÷ ‚0‚ ‚ÀœžAå•Þ¾ËkwTs1÷4`×<˜š“ª~ŸòMöÒ@¯gZ)•ÇâÕ÷fa:¼Yü—Ì_­~¤þúÌÐÅHP› o Â:3ó½ü¨3úôº‰ÚF TïŠÁ/ù6ÝÓK£FÜrWë"ÿ³7·ø8}e\Ý‹¼  ýŠw—zâÐ2† оÊ–ÆËZÐÛbÜji1…ñA%j}Í©f×^.ôÒþ0ÒEFÂi…2}t&ÂdöJû½טî;¦á†û"½#0?ƒëÐŽÈàºeÒMw*ÅNòäoÞO8ŒÛfº8ómîOí}FG§R µGךØ¿£k0i0U#0€Ìíj(~Þdêˆ*ìu¿¥.g0U´’¡ÏªtWó|8Gç5*…×x0Uÿð0U 00  `†He00  *†H†÷  ‚R&†eáëÜ2æ8’Ä3Á_\‹ãâ:PþǹÐuÚˆ²èö Ù‹v˜NÓ?£‡ÜÂЈ… M”OA(Ã\Or,^v_W¿î£Ò• Rño; Re>ù³™'˜+Õ*¯ø}EéË}2½üFlFÜu æóÞq|ͤˆ¦÷Fy‚Óáfe².úY¢Åòí{wØY£÷  ×zé<»¬.*›]íÔÎú+‘·uE‰p•-—äôﯗ [’å’øîo7мùôŽÂg_â~艚¤JD}+‹>Ò  äܬËìçâÉ´H~Eù24+'â  2ˆý÷åœFmüÒØ…ècertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest19EE.crt000066400000000000000000000016751274666402600313150ustar00rootroot000000000000000‚¹0‚¡ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0ƒ1 0 UUS10U Test Certificates 201110U permittedSubtree11705U.Valid DN nameConstraints EE Certificate Test190‚"0  *†H†÷ ‚0‚ ‚Ù CxÚÍŸ·àÂpÔóc"[®â¾øž0”õØÜ• à ˆí¾yŸoi“ïrûZtp¡[¼ ¹½8MkqòüzÔÒr$Ș7J­²–[ì즚­Ð/œÜW6À’\UC7L£¾)ŸùªP¶’Ø­…C©¬ªeMw ±Àƒ¿1$Óž K•ë?€°ÜµK,9í¯v]¹ãˆ° (E¡Ãeðñ ÐÆõ²£ €3ï¦Ä®4ᤠՈ4¥K±ÍáµXzØÆü† #Ž>©J« u X½² üKþ±‹^sFç¯Ô£ Ôx¯±ê¦Ÿ S.êü.É ¼Þ3ÔNˆI£k0i0U#0€EîÅÿãÄÇ08L[Ç]T™rÀ¸0UYC×âµ’Š¸µ)­æZó?4:ú0Uÿð0U 00  `†He00  *†H†÷  ‚ƒÀv9ýæôJRÅ8Í™Õ&8Þðr~À”ôë JNíA½ï±Ù®‰]ÑîIÖ…aLV XzQúô€Içé_ ‹ ïuÜS›½9Di®²Ú 7ßQÀqÓ8¿‘å¿dкlóÓ+w5Éì2e¿ÿÜV‘Lßý:ª'P4ÿßBÔ>Ït§sáQæ°jTõü—:oóežJÇeaßÓà ç~ˆ˜r#ÆuL¨µVRãïµ½^ ñ­ÇP oÁ?¡K6¶,}pÞÓë3)Ú#Ž•X$]Ÿê8Óqè-2_²°þd°ƒq[´²õ¨ä– +¾ê¼öš;殥†›žª–{Ø¡}certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest1EE.crt000066400000000000000000000016741274666402600312230ustar00rootroot000000000000000‚¸0‚  0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0‚1 0 UUS10U Test Certificates 201110U permittedSubtree11604U-Valid DN nameConstraints EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚ÄUÍÇ›Ž‰=M¼»¥¿Ú÷™ÚDŽáL¹(Hác^I#ÇËc2‡BÔÎÅjh1˜ö]w€2“ù/ß¼ñHÅKt«]º©\‡@ƒÏÉ:ûFI©ê¹Ê7µ—Œª€Þóñ†‹sÂwùÍÜʞ׳¢ón™dˆÐž]ý!t”‡¥©WIéÖGÆ¢ž÷ᦂ©„ÿˆû†YW T;šW4i|b¾‡Æb8ÏÉf…Ö”Ôpºeþ 6^’™) ·ÚlŸ_„Žn•ÙÐ5,ÓC͈¬^ß(6 ˆPUiòÏ#¯Á]2jÎ%´Nª* ¾I¢¯·Û8Ø?MÅÁ£k0i0U#0€AxBFÍN¨‚çá9ß÷©À üï†0U]þ õ¨ò ”Q:94ÉE ™’0Uÿð0U 00  `†He00  *†H†÷  ‚LÞMC!A¡*yý‹,ÛãøÓV@ÁÐUr>ض/Dœ‹Að%¤KX¾þ {KÃ)jà› BïwV<’Ö¶E?çwöÓÊ1 –8 âì57ÖeYéŒÀ=îý+ŠÿÊg<à Û•ˆ³{ÊÔ‹´µ¶˜.Šÿª Æ ±õ|5+êð*U}Ä;èDº2Ä‘x"ß230^Eì"ÿéxÎŒ\ÃМuJu‹z³K.-ÌíKËÒ$¯ˆÓùIþ\]ÃÁZóÇ‹\Û^ø‘ô9Ì0À´ >$¤`®ó-Üû%÷}=úJ_æÖšL¡x:àÛwa¤f¬?Ó¸àÄÏscertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest4EE.crt000066400000000000000000000017701274666402600312230ustar00rootroot000000000000000‚ô0‚Ü 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0‚1 0 UUS10U Test Certificates 201110U permittedSubtree11604U-Valid DN nameConstraints EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚ÌkPÈ"ë¿ö;ÆùPÕ+ ÉëäL⿜âJäk ±  MÏÅÁv~èJç#_9L*y½¢¡ùïß@¦VXœ¨ª:‰’àªR‚ãqŒÖSî2§Ã¤à’e‚sÓÝ ÂðlJ¼–v-´šÚ ÙQ9C „(Co[mI±w´ùöÂÓ5pØÀYâ,>Ôl£_}?ÉîÝ";¦¶¶;Ö —QCo æëDÑ{²-Æ=qÏR“üiœ‡oÀà« ¡S¤Z\•?(<û"G:†ëîå#²ËHÔ8â§½Ý0+îû&×öaf’ô¯ò̱™(·‡£¦0£0U#0€AxBFÍN¨‚çá9ß÷©À üï†0UÖª»(Ћ$‡¦=•¸…Óp0Uÿð0U 00  `†He008U10/-DNnameConstraintsTest4EE@testcertificates.gov0  *†H†÷  ‚Âí3—=Uy·¢Ò ¡b­‚F¤¤æ!~n”Îÿ&¨Ý!ÒµÚ€×G[Âw<°ä·ÀaPÜj/‹x¼1· m¨ßþN¢„=®ùH¶´o¬†HŸÕ=dˆu_í écg¡Ð ß«ƒ¾¨´¾2Á&ØÂ¬ÅT~²=Þo¤î¡²æ!wdî±³‰#JÃg¼ªÙ‘ènzƈr¿ !6覄AdLN)_£UŽy?Tív‰Gáüœ²uî«wLz^»ÜKÐJŸ`(\˜ô¥$´dSÎ.–%šÌ“;ñ±Ô¤UëÒ{ÉáÌÖÀÙõÙVÍÿó–é:–H`AKÙaLSv³certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest5EE.crt000066400000000000000000000021251274666402600312170ustar00rootroot000000000000000‚Q0‚9 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN2 CA0 100101083000Z 301231083000Z0‚1 0 UUS10U Test Certificates 201110U permittedSubtree11604U-Valid DN nameConstraints EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚ç}&ºQù]µ îÉB!—¨.Dvóýõ¨…ë!Ü㫱Oý©oâ|ü‡æ„N_n³Æ ¶{¯WцXÒ–Ù³“¸•â8 ¢ Ý™ó0ˆŸÕèØ¯¬eþà–û½ZÁ+¢#]BébIö1aëëPñò·ƒ“3Ý»røßU­¢þˆªsÚßQL•ïJñ=«8S¨Gª âš÷‚zk*‰¦wTGó 6… ÜËt?ˆØ&*Vù×EÙ^àN¹Ò¹ª0×åµõwÛqr¬8)kC¨y7£ 1KŒP²‡­±u¬û6$RA»/~!ªtGk²²›½ J ‘å$• zô-£‚0ÿ0U#0€£WÙ[]³`ök‰Q+‚à s¨{0UÉÙ€–¯R+)~, GZ(Ã0Uÿð0U 00  `†He00“U‹0ˆ¤…0‚1 0 UUS10U Test Certificates 201110U permittedSubtree21604U-Valid DN nameConstraints EE Certificate Test50  *†H†÷  ‚~¼ÅqV¹ž§ß´ñ Ÿ9U$¡}Y®[VÅå$HG³D@ˆ—9 ã½½AR®¾ž‚”‰M¹s"½Á¸Ñ2—7ê§ÝP ÑzåfB \‹âÂ.dTd1‰+H~WmH$øÁ²27iÝh¸X'KïÚe6 ú`JÙ°ñËcH‡€TLÍÆ2þ*í›3¡}®0 )´&ïlA£ã“ƽ÷”°gŠ<¸ä$3â#âUäL“=ëjì„=üØ·˜/Fž³AB!õy‘w‹5’Ökµíû¤uT©é vD*MáÉ« ýÃòw‘Ù¸;ùYÚ0g Žõkî;¯0W¬îlcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDNnameConstraintsTest6EE.crt000066400000000000000000000016741274666402600312300ustar00rootroot000000000000000‚¸0‚  0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN3 CA0 100101083000Z 301231083000Z0‚1 0 UUS10U Test Certificates 201110U permittedSubtree11604U-Valid DN nameConstraints EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚Ïø‹!÷Îô¤„¶U¡£4)ÄîáÑ4UŒ&¨^Ü‘Óè 7¡rZ¤²€ˆž•‚0©ó{Nütz ºšÛØW.?b|ͼñnS‚#Ýwù™-Ì„}¢X’2|~k<Üáÿ=¨{”UqBKî«Éh±:Kö^U튋_'ÊÉyšnŒ힊‚{wÿ[òwˆÐÍ?Ù¾wx ê%I¢'¨¾«, 6“éüà"¾éÁðÙæT,†üѬ%¢\_— |ÑñÐrPŸÑå8E»—Š^–'‰w Aɇóì9ê&-ħ… ´^BIWȘmË_áx…aþ'Ã[rôJGîLéY£k0i0U#0€Ü[¾Ç7Y¤Š@t| E;nÃõMƒ¿«§j×—9wþ#Rƒ’©N¿S‘*'<ìÛ„d…Ý"’§•/«õ‰Tle*‰ˆ SÖy{]üpÔ£¡-ÀÏø£ "€£ùó—LdÓªcy·Uy”®(@|c'\Ø£k0i0U#0€eŸp:Œ­öCÈçUŽèKÛ‡â0Uo¯pÓí $Þ9¼Öl²ØÌï0U 00  `†He00UÿÀ0 *†HÎ8/0,_Õ O\E&e1¹,‚s–v gK½nœ?ë’oô»É€=¹*ó«¦certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidDSASignaturesTest4EE.crt000066400000000000000000000015031274666402600302770ustar00rootroot000000000000000‚?0‚ÿ 0 *†HÎ80?1 0 UUS10U Test Certificates 201110 UDSA CA0 100101083000Z 301231083000Z0b1 0 UUS10U Test Certificates 20111200U)Valid DSA Signatures EE Certificate Test40‚¶0‚+*†HÎ80‚䋯@Œ×=|î–hÁ èÊžteKšT—*x3Ú¥Årê4³”hBÕýwð¨Bžd“¶Â1Fzi̘-V^#_(¿­Ði•b\*^ŒsI~ý"ŽUåVé®r)–‡'×wCð†¸ ¥ææEyMéúS_Á ½~ÅÀ?äüóLå>Ë *TlÐgl ;€fÔŠ ­þÑ2Ÿ¥§³Ðêw?ël¢ä)ØØ¼!Ýš÷Ìå´wMßìÚ¢ŒœuZþfÓÂï„C쩈nLºL?5–Çgü™½™)‘NØ®þk¯PVª/µ*Èî"G%xk!Ý?Îð÷–œA»^D’].ƸÍiÈ?;>ÐO¢ÎÙ„€,¸ì‚4a·cn=í/&%ÈÂs>Õø‚ðÐ/„Y`RFS5¨Sd8ÖðM1^•±ÇLãå|mYW!°ÁÏj¾|¹_Ä_aôɯHިݺ㟘²{qDÑøslw[dSȘL6€"B—~2Q¨ˆê÷ª¬¡l£k0i0U#0€ÆŒtè{ ÈYÇ}<[TY`% ±0Uœ{ÂOXƒõ†\*àvm¨MÜ60U 00  `†He00UÿÀ0 *†HÎ8/0,yµÒûeßÛÕÀyb/Ô²d<ÖK‡ uO»”‡òº}¦È|’mè„certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt000066400000000000000000000016651274666402600333670ustar00rootroot000000000000000‚±0‚™ 0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UGenerizedTime CRL nextUpdate CA0 100101083000Z 301231083000Z0s1 0 UUS10U Test Certificates 20111C0AU:Valid GeneralizedTime CRL nextUpdate EE Certificate Test130‚"0  *†H†÷ ‚0‚ ‚¹Ý¶ óÁ<¥"q«Ð ¹{ç-­¹iÖ°ô\h±hiÎy>{€<<¾n–ÊgpCá0î])´Ÿ~|y&âM’8ëª8j÷a4üHY~dË=ûû#É£PàØâÑë^åŒ4<©eÍ"q MQzZŸž:ç]d¸:yUˆ‹ov‰PX™¨¸Ö䨩`™ÛÎó’êµå•6Û¸N¡Hh"ÞÁ çsòB«ß­Z' ‘¦ÍýZ¼OœVßÕÀ'Ô *¥êþ!‹zJèF¹ÅiBz<ù®¤óÆè^m¶, {Ah…Qí^̱Ùåˆx­{Aj`ØÄç@“Q˜Á€'Œ›¸eÄÖ_£k0i0U#0€~*uï 6ÇKç ÙaHGŽƒ,0Uãß{³½Oä¸ú±]ÞÙ© !Ð0Uÿð0U 00  `†He00  *†H†÷  ‚9¡ì-ÐT~`'èqt{çkâ¡hÄay1ÓlÏ}ñŃ£8 –ø¸¡¯=åÛ6wyûžÓ €Ü޾‹úK-#ª}Ü>Ô·Ð`\îŸ,Yí+ï0Ã×Eº¦+Òút»'¾-i´ímÌU9çFL½ ࢜÷‡?¨ëpz|Cþ'=b­Ã80tx®Ö™B»¤»P%¬ÿÂ)ˆ†Ï$Eú`]eeÅÅ1é¯ MBû_[?4$éÆ$:~.òÖÃú­ÙUÛÚU=ä4fê¼>Œ–°/jÛ,Í€+JA,T.LcÛeyK‘7y£'WÊcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt000066400000000000000000000016351274666402600332060ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0  100101083000Z20500101120100Z0q1 0 UUS10U Test Certificates 20111A0?U8Valid GeneralizedTime notAfter Date EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚Ü›*W<‹8.gB@æ#KùlÅÿ÷O(ޏè´Øv”jéøâ[ÙÁëýaífæ"NžâÓj\U>Rz%-ãáìP²Ÿ),-&wçª Ë£ ?A1›@'óÚÈ›ÿSzé™ÂE\\B÷/"”Ìî©‘•ÑC‡ß»UX£Ö¯(%Ú§BáTJ`S´–¬zë«lV–ñ{¤á ¯³/ÈÍ­©¦¥` z&…jÅíYJýŸcˆë{ÖŽ~ë½N2§xq’Q_/¦G¥C0Ë» ~¤fä¯êÉ€&Œ19s7×@âÇ­b‰•{'¿~Ë&ô‡§É£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0U1=æÉ GëÀSÝ€Â;-¦¢Dî 0Uÿð0U 00  `†He00  *†H†÷  ‚p1/+øÿ‚ÄÓh2ÅÆô‰¹f2ÐÁ Î¬Ta§÷)_>;Z§}T1*“éò êQ\;¶xè[9i ”ÛÌ5öE¤Ë<ÙÖÚhà´£·ë¤Éºtvßân;³§·çù\£¢Èû`½W^í^™3bÛ wýÇ_”ux@ãôù¬:þ™‚}BGÐÿ|Ï4€üG7|„vÏ×zωEýÝÌSÊ5 Çô·©úâFï˜åÙÂ?IFBw†ä Þ‡üF³Fʤ:È Ò7³cg™åÚ#àÙ51¦˜fi¿fyüÝó-^ᜆ}ºbPÐßÜìÊœ„äcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt000066400000000000000000000016361274666402600333440ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 20020101120100Z 301231083000Z0r1 0 UUS10U Test Certificates 20111B0@U9Valid GeneralizedTime notBefore Date EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚­^ ï0Uÿð0U 00  `†He00  *†H†÷  ‚uŸ%&^ø<J/ŸÃ/| ‚9mšë‘eäýß|ä$;Sk>5TD ׫$×o6ãÌåo¤'¥ÃÚ2o4$MCd|‡Ulm_!ð3Ï„FO/ÚŠ†-‡Ö­ˆ–u+ º‚RåÀqü$;$ 5JrŸd)=ŽíÆ3¯óÄ•ËOÛ¾‘þr¬»Üçôû)²Ø&?Š´Ìÿ…ûX´¤HlÏÔG‰?‹¡ž—Ÿ^rTCÅ—ƒ$è‰8L¥ÛW"•0Sëí  ܼ9©Ï¬×iP Q|OÝ7yþ‚ï·O9ƒÆpƒÙiA"s’¢«† þ˜A‹&å:=“êD]ŸÆŠæ®certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidIDPwithindirectCRLTest22EE.crt000066400000000000000000000016331274666402600313020ustar00rootroot000000000000000‚—0‚ 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA10 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Valid IDP with indirectCRL EE Certificate Test220‚"0  *†H†÷ ‚0‚ ‚º‰ÚAWÞ¸]f”à?“®«¡Y5uTðwÑaã…*X+FþʆF5…Žà~ùq…QÝÆý–>«_>UƒOT$øz 2ûÝ£q|9tñõ«ªÓ”¤JºB±–‚«a‹Ïd{Ðn['ÜHvév©n«­¾ùk§  {¨uýzêê‚5D @®˜ŠÛ@aƒåµ'-K”б‹Æ?ìø\ßk’Ë?Ÿ=pZ4mL›–A>õ ¹ âß Ûj9v]ÙÜz‚ ñnRuªšøúQ‡»…„]¦4Æm£k0i0U#0€%ø¯ü¯¶©yKÛËd,‹K±Í0U ®Uµy÷ñê ]qKˆÃS0Uÿð0U 00  `†He00  *†H†÷  ‚RÉ¡ë(xZäζŸÓÌ{•N®Áåͽì…î$hÉ(Ÿ¿b!Ü•V¾)nÁÙýÑ‚S²Îy4\•3“ðû¥î°6è1¿ ¸y°}5fW˜ôZ½ã:jq•‚îc³ˆ cY ô]«Î„¡É•O„tõeò‘-ÁŸµêh ý£Ç0Ä0U#0€ˆ#á³³òlþ1©¾‹aª;’‡¤£0Uc³åæœObìf ªQÛþI0Uÿð0U 00  `†He00YUR0P0N¢L¤J0H1 0 UUS10U Test Certificates 201110UindirectCRL CA10  *†H†÷  ‚%—ˆI"MYw»3]ÿGµcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidIDPwithindirectCRLTest25EE.crt000066400000000000000000000017701274666402600313070ustar00rootroot000000000000000‚ô0‚Ü 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA20 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Valid IDP with indirectCRL EE Certificate Test250‚"0  *†H†÷ ‚0‚ ‚Ê{ ƒ9/Èþ=}#[xÚ:aTІ[þê‘ì¿ø#ÙJmØ7±ï‹ñMP¾øqðóY@‰ú×/ë!¿T‡ÐØ0ûo2Á°8«e–ïßý'NãÙÿÖrï·îÙ-£+OZ_]ÝùõÙ¾îü d/ÆrpÄ~Ò#ÆV†ç޹»iDêQvÖ«¾Û^Á8ïü؈pTÐ âYµ¬Ò0ú{§V>胑n¤6aw¦Y¶„ÌˇUW¥~Ñ4kU.‹‹RÜv¤,»6Ù[$æ2nÕÒ9?°qÚ7\®]ê§"|É£ðæeÛUçûaûådp8CËcAOS´N|€¨ ÒvZªðêfM‡^†Í£Ç0Ä0U#0€ˆ#á³³òlþ1©¾‹aª;’‡¤£0UµŽ@âfÃc¼£‚ê~º\Ý0Uÿð0U 00  `†He00YUR0P0N¢L¤J0H1 0 UUS10U Test Certificates 201110UindirectCRL CA10  *†H†÷  ‚N­ãŒžEÍý‚Lkó‰2S!;“ÌøÓx3½0ͳ¶”Ú4ñÙ[Ï–Ä™ùÛûšØi¡wNù+EÀ,ö¦zWÌÕòWŸ——Šã¿tZfKž(M+†Nƒï–=}︵ڕ‹šÑNÈLC5­)Á€2AËðÑ+° u‡¹Ùæà ¥”ñî7ã™hÒs$žŠ# hNjBгˆ`OO¶U• m©'fjTŽ´ß!‘_¥âÝI¡¬ÈßS jJ*òçwºðì¤]±ýˆA~²ÙÞÉǬÇâ„øê0ÑþãðUu€v"áž÷øÐé/Å5⻤Méa"certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidLongSerialNumberTest16EE.crt000066400000000000000000000016621274666402600311240ustar00rootroot000000000000000‚®0‚–  0  *†H†÷  0N1 0 UUS10U Test Certificates 201110ULong Serial Number CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Valid Long Serial Number EE Certificate Test160‚"0  *†H†÷ ‚0‚ ‚ëI~S?ÇήI”͉÷ùÀÞ¾¼zó53»Õ5ÞÇöYü:‡­4på3á½Ôd`êîgL©33{SqÂsÐU”C‡¿*4Úܤ e4¬R€ÅAvTýÿÒß¹:!ñ{NôJ_=3c9ìß+¢]Ûe½ÃÈm¤Œ[ra‚wä:J•§!¸—„ÿ«%t‘¾ád-Lù¹ÓXˆÇ8ß#"‘Uð™‘ÂU/脽öK?¤Òåƒ+ãnå¤> ”ÅÒ5«üe{-mæ*•ð›ãYÓ«iGÄÅè¤UD´8^øwØÈ­ê¶!†èZFs¹ŽˆÇ¹J¦Ã½ò>×pŒ¸;½ºúÔ¶2’dÃúJ k,Á²ð ¾À÷qe_&º7ûÅ»¿¥Oò£„”ëxÜ&JÁ|CÈÂx. v¨O¨g`Ø)w8Ì­[C,ŒŒ ý­×Kœ);Ù^Þ»†ág‘tðÓöï1Ý-0UÙZ- o"2dYŽ iį¼SQ¾!}Þàr’ó¢)ÃéD…+×û…EÙ¯Žl$™íö©Iúg Xæ®Ku”hOü` ´CzÉb ,¥certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidLongSerialNumberTest17EE.crt000066400000000000000000000016621274666402600311250ustar00rootroot000000000000000‚®0‚– ~ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110ULong Serial Number CA0 100101083000Z 301231083000Z0g1 0 UUS10U Test Certificates 20111705U.Valid Long Serial Number EE Certificate Test170‚"0  *†H†÷ ‚0‚ ‚¼Õaìáì·‹¼'D±/vÙÿ1Š5›-Þ9 Ñå}ÊÕ–ã­è£~q_ÀëqüÒÍh̺¯…mªýq=.(7E Ç/n£±µIäqÊEqõy¥Ç#-Q'1ÆÂ].˜G'¬9ÈA'C-‹~ú4P1ŸVÂ0²zåÓ¯l3_Ù lp&;×5G>†ÆR˸•ka¬+þ>€£Û#ž% ZÄt¯òlŠ_À Ž>KN¢›™[‡Ój N~ÏOÆBÀ˜i¸}4—£€ÁúîqV)*+m¹`ªjÊŽ¶É9…o0`^á¸8ö!7R~å5 •›ù+;£k0i0U#0€ c·G®Â2oã:¸ê ÿ×d¤0U LSE=¦”ÎÇ1tgºŠµ» w0Uÿð0U 00  `†He00  *†H†÷  ‚©ë  Š³‚þdÓhÒµºÖ¸etÁ ïî§%ÓÍzøiü;<^í7I3µeT€Ã; Êw©}œáÉ¿ù˜«ALhÊuÝxfë°Ò.VÆü¾çAèâƒà@c0ú0‡i<ª3q¤Ñ`eYôaˆõƒíEû00cdøçÊ:û˜PëÏ,›x= Rއ»‚•ì ¸ ”¤0(ÆúZË¥Hì­THzV–Þ–iŠý!Ã2Õ0ÂÈs©Á¨ ‚ Œ±URäÇ}ícertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidNameChainingCapitalizationTest5EE.crt000066400000000000000000000016321274666402600330440ustar00rootroot000000000000000‚–0‚~  0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGOOD CA0 100101083000Z 301231083000Z0p1 0 UUS10U Test Certificates 20111@0>U7Valid Name Chaining Capitalization EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚îàAm.,´z&ž/XbyÖܶ-b$º~˜ÜÐ#ZüBøðãBû ɆÉRt0»p.ÏÐÜ*±ÎZv¸Šx{aþ!'ЃâéÕâ*$'vuIò‚œ"í¨[‹(4¿f<ØÊeÙp uKµr÷Ïú-ä¶ÁÀSï< (ç£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0UxÞšC«gxR¬ àµ#“à'cÂ0Uÿð0U 00  `†He00  *†H†÷  ‚n©[ò ÔÚÃ×ióqÆÌã\EƒVÇ‹Ý@L­5ç€tP­ûõ_ÂÆ„þ*åë×¼²ÚS^¡ç8ìjîi#-Å2Ô—­CVýžÛëúx³s_}ˆ_Ñ3*¨²Ú´Ž·"&À)ñÇ‚MæùüˆÉ7Hx,úï6uššŽZÓºÔ˜]Aí~ öË šäì#n7Ý·ißêsñÔ}9 R«jnÚÇ«]«ÂN„²šÊò4:¯ÿ1‰ÉK¾Š+wÌO‚,ˆ„‰ê5¤>8v…Þ–h\ÿÍn.oN ³Ý¸ ö·Ư#b@àðZºz¨gT²^ŸS‚Í…š•ãcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidNameChainingWhitespaceTest3EE.crt000066400000000000000000000016331274666402600321640ustar00rootroot000000000000000‚—0‚  0  *†H†÷  0E1 0 UUS1 0U Test Certificates 201110U Good CA0 100101083000Z 301231083000Z0l1 0 UUS10U Test Certificates 20111<0:U3Valid Name Chaining Whitespace EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚±ÃÈI¨­)OÛ¾.ÿ_P|Ê‘ÏR#?³Á3Ÿþ™Ë‘ùYVtˆøè·$)›Éቒèvb{#^ É•€$d”wƒ](Æ¢Ó×AÂ8Ž›VN(†ù£Sí¶Q¸9ãNÌ.‰mÄ,zˆÞ|tµ,“ôjqUi‹{*÷ó‡5¬SÛ?KjEPáÌëø‡s¡ýg/ÂÅÇ“»}@Ü¡ÑgØ¡0k°ev_f~ÇÐîTÅÛt„h>Ì †]½Êƽ¨ÍDˆXšHžDƒÆÊ$²á @×%È[oØì[ˆ>¾¾Mˆ&‡äµ´ÝlD~À …ºéúR¯õ£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0UϸŠìÝ ºOá™^ÇÚBÐQ|値 ïá:┸LJHÝ”¥¦qkˆØâ*ÓM>o¥uœßHºЮ§¯_\7¼ñ‚Pâ¥DÚǶèßüøy?ÞQù²8³Ýœ:/C'&Òm!5 »éoà wqP阾¸;œU ŒØG‘Çgêà £<ÇúÈ8ÒÿTï‡aúV‘^ÝÌ6pcÙ„ðÍŒïðàÈÆMøPŒûÌ[‹¬ÁgBÉö^`8ò‚bH2æn›~“ËþQ‹(ºwÖ³;!’›¸ðøOËÈ”\ Ñú£åp§ÛCé?ÊÛÌ17µÈÃþ‹v9ßw½Þ®¿+HåÖcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidNameChainingWhitespaceTest4EE.crt000066400000000000000000000016341274666402600321660ustar00rootroot000000000000000‚˜0‚€  0  *†H†÷  0F1 0 UUS1"0 U Test Certificates 2011 10U Good CA0 100101083000Z 301231083000Z0l1 0 UUS10U Test Certificates 20111<0:U3Valid Name Chaining Whitespace EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚¸-¯óça˜¼ [Àð£†+ؤy[1kTîËÜòÐDG­­ëZâp·Ò-Ýp¨àˆÊ ÍþïŽb^Yã!AßB"&mNN>È=ýÁÊúDÆóéus°1Þ @a!HιÜ9–Å™VÌË×ì>„ÔàÐ(‘3úʇ'Q‹Ç—ø&ê*öeŒÛ|¶:Ÿi¢Îâ÷akoÂ=^Aˆ`z~³iË’>’ö¶‘v~D:{.‹¨i(òZôÙ ñúã£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0U›+¬ýy­þ‹å—HÀΩf0Uÿð0U 00  `†He00  *†H†÷  ‚Œc3½ûÀLP­7‹ð F Œ©º¬Ày$oÑÞV5ÇËãs7µŠï®£•%¿¹44•vu;ÌúP~`-mÔÓà„OÛØ—5R¯rŒ ·ÔœqNK" öòãß~béDE.dèc›ºmb®ùt»´ÚD¹ä˜ÌhQ ð jdÉ¥U•ùŽüRYvIôÀ™5¨R‹År›éƒP žØÎuâûjÁ¯ÜTAÓ¿ uÙ* 6Ÿ•+lçæ«})Ö/™5ɱRKª-ªnvãÛj@ÆF“ü¾Èý@Õ’˜M¡Ñ’C­´UŸuÛZ¡¿ØožþD—+ȽÚ¸:i7ÝâN¦¼üÌ.*certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidNameUIDsTest6EE.crt000066400000000000000000000016051274666402600272350ustar00rootroot000000000000000‚0‚i 0  *†H†÷  0?1 0 UUS10U Test Certificates 201110 UUID CA0 100101083000Z 301231083000Z0X1 0 UUS10U Test Certificates 20111(0&UValid UIDs EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚¾5ÓNÕIÝ »+Èm(³ïõ° çÏj*;à“‰wü“è{zY©3¶.¬b~evUý½:Jc_‹o …ÔU‡hxó]{•“nŒGdΟ˜4ÎÐ¥@C€:Å)8íBt ~Í!%ÆË5 êu5RY@_ÕÚœPëS3¹Åq`ˆ€ ]aÏ$ö§–b",òãa:5xÉ’¶ªsþe¸/‹ºß³ØQZ¸Õ7™ø"£à¢PìÉÅ÷íñ7E^Q’#æ¾›õª]ùõbRÙðÝôÀ–ᙣEà,0š@SÊFó·x÷j°Í(Ò 4S3—x[E¬nÃî,4Ôi… £k0i0U#0€?Å0ñØC6…y\Œ‹î/©0Uµ"þ#÷|PøgOÑÕÅìúxK@™m0Uÿð0U 00  `†He00  *†H†÷  ‚U™®—Z5¢x¨F®Ì‡¼Ìg±wÍ>¼€F·Î×çgý ­úÚÕ¹.Uª§Ñë]ÿº2Ñ‹%LGCoÇ*ÉÍ4¾¨Cd7`Õ–µ(©Ìüÿ½ˆ /ze¦œê8žÃ@Ç`x„d~®Þ°éñµ_HÊËÚ ‰q1À­w ZX–ÆFGÿIÂ/âš8• Ùçe—b® y¦þÆ—z7ô¢ù á© ¥¹ÌsèÆíjy6ÑB‘§J›i´€â ¾Ñדbˆ»ú ­·5ßöjÄLç$Ó™CÍó¦7¡ñ´iNE˜=ŠGz–*µ…p÷T¾¿úÿÉö&×A‡–Ö‡ocertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidNegativeSerialNumberTest14EE.crt000066400000000000000000000016501274666402600317620ustar00rootroot000000000000000‚¤0‚Œ ÿ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UNegative Serial Number CA0 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Valid Negative Serial Number EE Certificate Test140‚"0  *†H†÷ ‚0‚ ‚å!5§ÁÎçPÇ[=+÷Éy¨[ |÷zÎ=“ÉF–К á^6öz¶(®K½Ø;Ð n0’"§,î¡„¬‡wÇÔé?‚·Ï?YBBÜ#`U†%éÙ6ˆV=Þðbö[`Ã>:žéB©Çß‹ëÚ‡òelc¦ÀïC¡OÜJb!Ð3öÏ]¯%ŠÅ<1›l·«Ïî¼ e L2 °|N©"™ÎiTBö:ó´ žqÌj]‚ÓÖÕ“µªîöF?që\G#Ý9¥{ßÍ…ß,Á“‡´¦µ:¡;4óì&Ñy6²ÞoJi9I ·©¿ ãQú§Íœµfä±jLöÑJ£k0i0U#0€bä.5ÆÅè‘Ð ÁÞ¶¯ÚˆÙ?0UdŽã"ºÆPæ›™¨&Tt1¡0Uÿð0U 00  `†He00  *†H†÷  ‚:#³qìÂ@º;¦r>A—xgx·bŠáÂÂ#µ*ƒý6x5ZDxU7Valid No issuingDistributionPoint EE Certificate Test100‚"0  *†H†÷ ‚0‚ ‚Øœ`8¸#af°p‡/ u…O#rsÆ9‰Ì…;‹VŒ¦½Á ð&ÈrmÂ#-R‘–Ì^š¶#f%”A$Ñ[ÍÕ'"¼O Øk'´t‰ ó…êæp3ðÉR+/Ü_1¶gô_O•¯h Œò8¢…÷Êpf«m{GM­—‡ÄIÜJCSb“ƒá?fBRa™Ngûœ÷«Îèk››8–+‚òÁ«ìú>¼ñ[ Ëžìõ”;DJ‡<¿³F±ÕûÀžŒ•Gkcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest11EE.crt000066400000000000000000000016501274666402600304570ustar00rootroot000000000000000‚¤0‚Œ 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"Good subCA PanyPolicy Mapping 1to20 100101083000Z 301231083000Z0c1 0 UUS10U Test Certificates 20111301U*Valid Policy Mapping EE Certificate Test110‚"0  *†H†÷ ‚0‚ ‚¾Õß„ïHd@i£7~fÔHÒJž¤•ȨÓNÛRÝW1kšW ©F—ÂáØ¹f¹ lù8>tºb$Ùú±j†#ÿÈîgG òDóÌ=ícgè(í÷®70`¤˜RÚm5ÿ¨ßà›,Œ¸m©zÏ·_­Ø>~Ç“*M‡úkh7g°zWLTXT_Ⱥø9ݰ1…N\KnÉ\(÷F©ÌYu3´¨rlk!';;Cñ7qÙsaÅÉ#²`$P°c6¹·’«ãT2à 0Æ*ì?Ž"ã¾^™gHˆß”PÃblwÑB=ðcÖÁjxr0‘ÀšŸ#n¦îÞ®ô_Å÷£k0i0U#0€[sy™ã®ÓЦ3Nxä ±äÉ0U7þ Oy×qÒãõ» ³L,Ï"}ª0Uÿð0U 00  `†He00  *†H†÷  ‚ªIuâkÀ½¢»èn H©—­bÑTŸîª`B¢ŠŸ-ì*=liÔ…3‰69õî`&Rû>‘.”ç”gM¨‡¥ŽháùÓÂHæ<…x,Îm*/¼àÜ ?zMç\“®R÷.?«*é2¥P²P«$f?;í£g™‹zQw½«û?ú{³¯Kó|•QS¿{{ÓÁ¶ÌÖØÁ—='W'³ÚÝ£Íq?¯#x¤g½ä²}QDŒ.tú¼–Ó(e<Ñ€ÿ—§I€¹ªa‰8gn(÷‡¸Í sG~¦(ÁÇ ¹¾êó_ˆÚ#–“,!œŽFµ³¤BB{œ=XÇ µÉBcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest12EE.crt000066400000000000000000000024731274666402600304640ustar00rootroot000000000000000‚70‚ 0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UP12 Mapping 1to3 CA0 100101083000Z 301231083000Z0c1 0 UUS10U Test Certificates 20111301U*Valid Policy Mapping EE Certificate Test120‚"0  *†H†÷ ‚0‚ ‚¬Gë¦ÚÆva O$31=,¯OÎÚÝø •×¼ûŽ']èËÏ0a9ôõíô¨ ¦è¿ËŒÅ(Áïm’Ð<1#í/Ë1ª×-ûÚ y‘\?m(œ]}Çñ~¹¥_g6!£î”LÔ׌D Áç6^ ‘ \5k­×¿é¾vø7·Ø$ó’èÇtÀ´ozZ@HïßýBÚEš¯ª"(…kuŒ3ËìÌŠúÒµKm•êJ½3=D–h韫<Û"uÐ`mèô´³>e ññCI‡Ræ"æÉå>?[?ž ¡äQ…mŠ ´ŠÓÅžS¶W¹“?d³‚oí…rª¶½¨1K`„…„Æ{x¥ I‡Ü,щ‚žÏMàWš”ÁõŸ¿ûLZTÈýmЪ—Îò„Ôñ¢DÝ’h™7†dÁˆ46Žv+žû)±ÂñyG£÷éðÄ?JaÊ8zªþc_}ìÒöcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest13EE.crt000066400000000000000000000016411274666402600304610ustar00rootroot000000000000000‚0‚… 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UP1anyPolicy Mapping 1to2 CA0 100101083000Z 301231083000Z0c1 0 UUS10U Test Certificates 20111301U*Valid Policy Mapping EE Certificate Test130‚"0  *†H†÷ ‚0‚ ‚¹é³ýfÝV޹bT³3©ø –4HÀ—·ÉÐÿ+/6Bìnjj†y«§ Žg-µX‚ÄØú25@¶uR4ˆóô1ûsD[ÏÕ‚˜ÌbIô}NÅ©ä³Qòb9òä&ôE¤©2å#Æ ‚*AášH¤¥TÿJê]<á8rÖ¸¢‹çXê¡n+ šÑ„Çe<žUj+½›S}¼ò·‚‡1•ÞÝqòïüOŒlyÞ™Êu>ÓœÓÂ|Í—Ù®ÞeúÒWÑ·’Qã§}q¨¯,ò8w<ÆA¥Ý„y=¢_Ãß>ĸí+_ Û¯£©'ö÷ÔT8­l$1"ïIeê©íU¥£k0i0U#0€((2ŽJ„ø¸‹Añ]{è%Rk†0U<@CÏé ì•¢q¢qݦl}P0Uÿð0U 00  `†He00  *†H†÷  ‚Jí©·î|YDËŒöõ¥~%Cã`Šcñ~Ðuæ#Ù{LËþElRN”EÝkq-T Z9jĪ~U7‘‡s€ÅDvãlÞwä+É Y"†‹šŸIßëσõ€È`Ù“Ëúpª³‘DÌ…¥ýש#ÒÀÆõMy€±|¯PëLÁðlþôó6KÏ‹eEž¸…wlãX(sqxönåžÂƒõ³ ðèÕ}äÓâR»È,Òä§™è3‡¶uz7ù™¾pýîóä\8›¸™&Ü»ho9Gж uQŒæüUn ÐÔÇy-Ï,ÙPxäÏÚÃsˆl厖üø certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest14EE.crt000066400000000000000000000016411274666402600304620ustar00rootroot000000000000000‚0‚… 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UP1anyPolicy Mapping 1to2 CA0 100101083000Z 301231083000Z0c1 0 UUS10U Test Certificates 20111301U*Valid Policy Mapping EE Certificate Test140‚"0  *†H†÷ ‚0‚ ‚Òi\ÀÜHìÏTƒx"š°3„‰X§R²Î||4Ó#Jì}&20kœ‡>ÓËùèmÇgQÙÙçE(túÕ ì¿ *òúìx±•Í¢ Åâ|fHڱÿtê]«Të×= sCšéäÌ=áÐÿð§ uvÓØG^—'k¿q ! ‘Üë/%œgù&Ãq+ŸÔ.Z{ ·¯S†ËÕ ˜®ŸmÔ(}¥À¤Fð”éL—1§iþtbï—ÙÞì^ífžþ[¢l€îHƒN‰2£ ø++ŸèàÇ C¬ „Y[êlˆåùsÝê'lô¤Ð"¬Âp“5λ£˜ÐA6„i£k0i0U#0€((2ŽJ„ø¸‹Añ]{è%Rk†0UþÛhÊÂ3Þ=;@<âÝ ø ±®0Uÿð0U 00  `†He00  *†H†÷  ‚­øîÈ®oؿ̵Q­™!üR9£©7ô^ÊðÙ²ÝÚ20{Ôž“¡X•¼|ý¾W†¾j:il}Å+ÈêßÁP‰J•ÀÔö7ÓRàD‡jï†ï¶>ìiX鸲>ìUÐÃ*_\Ë–~iì 53SÍO‹úCÕ­ ?¢< ð’ˆV:³—Ë4~¼ó—½þÿE|"ò¹ÓîàIMJK˜'Þ*E/£ýä YžA÷X‡[ÊêSš‘K’ /n5ðNÀBVŠ68–üOdˆ°sË. eƒ©sÉ‹šRt…/Œò 8¨ûɧïA­†êF€§~SS, FÙü`ë¼ Àø3ž#îScertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest1EE.crt000066400000000000000000000016241274666402600303770ustar00rootroot000000000000000‚0‚x 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UMapping 1to2 CA0 100101083000Z 301231083000Z0b1 0 UUS10U Test Certificates 20111200U)Valid Policy Mapping EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚Ö¬8Ÿè`žÄf¤(oG' ×\ÁŸZþvy6Š6‰Œƒ_Mj) &?â=ÃõÁÒ#dG)Ó Ý;’”^ˆÕä¤^åWŸÎëx~ô0GSé¿tk M¸6$ö¼L†›{Þ{e~¬W€—éí:dXàæ‚r º—ØôGGØ-ÿ þÃ@oQÞÙ¶7Xºtï!L@È›Œ<±5{6f«éêäËÖ•0%Á´DœµàHµZ/DXÔê A»1Nú%¾ª*Ü”ª„…ä®yz3ØlžìÃHKïc/Ìm¼áaª×^F“–Þ]žr~¥énØ ý£k0i0U#0€™ÅxiË=3v™¬Då°þ¹ôÛÇ0U•¢<ŸÁÏŽh º|ª@?WXÞŠU0Uÿð0U 00  `†He00  *†H†÷  ‚«½¡+ðªQ >Ÿw$$™­R»³™Ôdz¼µï³ZBoÄXd].‡NŒHC cm3FGÍ|µQ*oõß;Ë©Û(5Oh$( *SâLËUy0õ«95x5ÊN-)qðÉè³îLsYô')”™ÌàúJ„)= ÿïTëÎY¹¡Y°ëô 硤²§êJ VbšÒ› p‚°gÃV´à?ºAÃC²V®bÉ_»HövEWöµ[«‡»þf!ÑÉÖB|kþÜêÞÝŸzüûURTž0.ŸÌžÅÓÀ@-瀜D™½ÚÚR先ѱ @xÊ• Y¤Ï}-ÁÀcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest3EE.crt000066400000000000000000000016361274666402600304040ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UP12 Mapping 1to3 subsubCA0 100101083000Z 301231083000Z0b1 0 UUS10U Test Certificates 20111200U)Valid Policy Mapping EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚Ðh~¢PÉ´2†ZëÅå– »÷œƒ\-ܹN×ÐÃa¯ Ãýê¢W.ÍÅÙE@†Hµâ—WXæ‚Z"ÉEmÝ r50 leïà»qâs¯®}iä‘6}Ú«kàxÌç¼ò‹øê§<š\?pü(¦Ù %czŽÿ£¼_œR#u f_¯Bžii,•sGtdNˆsTc;6 1¨ün² r|¹o×2“—È Xù¹véßNE-P XQ KB'6&e´ž| ×]ÂÐPŒM\Iƒçê®jÂãAÏS5ÖðwL!S”’ØÈÓþIùéï?GâÄrÀ£k0i0U#0€]9>åª*^-ö®h*­3›=›s0UWr¿^¬ÆxÀŸ”F¤þS¼Z0Uÿð0U 00  `†He00  *†H†÷  ‚M>ZIµ©Rhm.‹€.Úñ7Ø+„/Á÷:-ã½ôD!üÃ!db± ÙÕ×"ª1¦-¾|qëe5´ÂJÁpÇ`Cm‚· d5e÷EbócÝU×÷–Éád[²§ù(“¢“¬ñniÔ…÷õT(2 Úð •ÃÚi½(¯`G¤rPŸÌn4’°ê ·»°ñ²í¶Ê_¼ÞÞõsIp%*]Ú°Ø ÿË*­©ŽqGF:ÞaÜÐSª•jÍq‰åô9ÚÑ€`âYGO¹åæéÑ5 >«j!`‘³c /÷‰!0)U…6•ÿ…ÊGPòUmw†áô#±¼kŒAJõ¥ vãcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest5EE.crt000066400000000000000000000016341274666402600304040ustar00rootroot000000000000000‚˜0‚€ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UP1 Mapping 1to234 subCA0 100101083000Z 301231083000Z0b1 0 UUS10U Test Certificates 20111200U)Valid Policy Mapping EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚¦ˆc p6Š0¹ŠÓ)%UÓluá‚àðe ¦q&9fvœûŽØiÚP:ÉA»|+±L§‚Öa’9èøÔüüÍ9%ÂýKC˽òBI³~9ž€#”Ÿ-ÙÓ)s:ÍL( œÁ[ö¯ûÀ»c*¦:4µ£k0i0U#0€å•ý*9x¯ËFö@˜e í»0UK‚0õ2©ýúö†Âmä×3¿ªíQ0Uÿð0U 00  `†He00  *†H†÷  ‚Rú…Þûâd’¿“Z'2 ÚšU«v ãH s/ûj.LëRÔÈke°-L>Ýê)OvOÆj`«VxóyX;™íc¯Ùcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidPolicyMappingTest6EE.crt000066400000000000000000000016341274666402600304050ustar00rootroot000000000000000‚˜0‚€ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UP1 Mapping 1to234 subCA0 100101083000Z 301231083000Z0b1 0 UUS10U Test Certificates 20111200U)Valid Policy Mapping EE Certificate Test60‚"0  *†H†÷ ‚0‚ ‚¯†â±W£¯À†¾ùò–‹nˆ|Wvhc t1Óýbã ÖÿùÒÝ&V)œ†A«¹u” È@X˜4†g©Ý#ðj™6Å·£ÑBýZîngÇ¿˜ž° §ûø#k»:~Q¯¶äcBmà Ý:¨ÄÔÕÖEþzôÎâìÝ€UVtÓX¹«OÊ뫎,—#žmðž]—•bí Ë›i‡I–Ž $óÄלë\ðq/‰´¤UäÔpLƒÀ›¥R1f_óHA{Ë+ç.ZK qEK08mR·JÈÙT²Ù§5‹3 ÇHž){ )¡ø$ÄŸgš7%'ÊG´5\L¤f¦Ï£k0i0U#0€å•ý*9x¯ËFö@˜e í»0U³_ÛAž ÛQzÕŒ;ílÿ k0Uÿð0U 00  `†He00  *†H†÷  ‚iRy(DpfXFº`é`$sÁ®;$š˜¶ɉƫ"Q>™:§âdŘu!#Ÿ:Ûß‹Ð),Ø;åkØÍOw¹Ö}ÌÛYÉŠi­©ÃíÏëø¦Öî$7]2U¼MhÒI;l*Ž“mê Cçk$ì,fh›«¸œRYšºøB²èÌÞf%Ô<箌6±¨íê‹ Ö*a!“ 2‘|.Ï©õÊgs8µ-x«Ø ûC0) }²fkŽ¢»4¤s>¢ŸQÚ5R=†ÿª†s–ùãW•UÄ‹|&û:¸œôs¼.íÇ&Â=}J7}„Ëw§†TgÕÞÁǯIR𠞊‘à~~ߣk0i0U#0€G'/C=Å/Ù’¬ÇÒvÐ3Æùw»0UdN¡wrj9 žÈ½w|?Ê |0Uÿð0U 00  `†He00  *†H†÷  ‚LI¤¨ ‰¾Ç–š(£/ƒ»±™{Ò$c*}\HbºŽÔ3t=;=.$QHã¶?þF0$öIré5ô1š‡>„á™ý_¦ÅcÀ³dp!Å{ "êõ›çN“ZÔ5MØe ¬ yÉñêe¤\»¥ï—¹%÷ø®À|q”$Â÷ é}#øä!3†é®BÜtÝ.'þÆ(>a>Ô 5Ó3Á[Ÿs€¤¯“Ý´Q³‘]þ¾{ujÁæUó&Yõ¿ðÉV7Nnái¹*^ÆÆæ¢ruB÷8ÂÓlR_lÖjÙ@ Úð÷›©aÝ4+|kâ $/¸6· …#T³÷‘certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt000066400000000000000000000017631274666402600333550ustar00rootroot000000000000000‚ï0‚× 0  *†H†÷  0“1 0 UUS10U Test Certificates 201110 ’&‰“ò,dgov1 0 ’&‰“ò,dtestcertificates10UMaryland1 0 U3451 0 U.CA0 100101083000Z 301231083000Z0u1 0 UUS10U Test Certificates 20111E0CU"R›c³aÃÚÅú¦Õzð4h´ÇJÊoçIÉ~G - ÃS`ŒŒš ·:ªÌZœmJ舮¥p ÆR$1æ¾N±\&Üîã"ç ÍÓ ôóºrúh²–'ë5(¶Luýù=m¢.‚©7šÒWž™8Xþv Í·Ú˜ÓR×®ˆ·¡¸Vsl ñ^¼â,;qO q>›ºrõgÿCôFmQÚ‡£ÈA.5†µ §gkö´×à–Úk/!ƒÑSὓˆR'ƒ¼C¿ Ê‹Œ­ÇGi\O2certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt000066400000000000000000000017761274666402600332110ustar00rootroot000000000000000‚ú0‚â 0  *†H†÷  0Ÿ1 0 UUS10U Test Certificates 201110U Gaithersburg1 0 U*John1 0U+Q10UA Fictitious1 0 UCA1 0 U,III1 0 U M.D.0 100101083000Z 301231083000Z0t1 0 UUS10U Test Certificates 20111D0BU;Valid RFC3280 Optional Attribute Types EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚¹Öwj–¤Úùý}8±f0MŽþÃ_h$gÈóE­8¬Lmʈ.²ãE4Ÿ ÅsA3À‡V«l }úŽ!¦x›`QɰȣcmocÇë=m=×ߌ‰úOn@QD¿`7$àÁš„6P膾gM%Rs—÷²¸"ûD˳…´‘§–Þ]hR&(ðW NƒÂ«ó‹cÖ˜®ý3z–QWºC¤ÏÇŠü…ëN<ÔÉ=Ä£CòÁùd)$6FÅe¤ˆrÒ×õ>iZ·=&Xñ×SÒáÂ'  «÷*;Óqdz4Ý« ¾ðœ€Rûš‡Ú±îÖB—ZÅŒÆM£k0i0U#0€›no?Чô経1[ΙK‘||½0UZ5´‹eoñŽ­S`ª#ž¥e(C0Uÿð0U 00  `†He00  *†H†÷  ‚"ç, ²»çåÿ>‚ïuD—¡Öý}õÀóU¶6:­}§zòOC;eXUwʦ7†[LŽ•4È‚Ê]r…m}ÒÌ~ŒáæNb.ƒ¸l¸ëláñ›¿L©°rÅ!¨Ô‚øD;ߟ­‹­œ¬=DÃÍñ„éü¬ú‚|¨üqZs^_ç 9L‹`KøþV…1 ò\¼iÈ–]’Fè6Ú«£9¾ÙšÓ$’Ö½ž¨,Ö¬‹ ~î„Æ'VEMX*aMZ³õ8G¸Y{Ò…£\bèü‰dÃÇI í°Ä¸$µ¬Ä—²§ÒóÂLyhÏØÆÃšV×¼1FO.RhßG÷G:Ò½certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidRFC822nameConstraintsTest21EE.crt000066400000000000000000000017371274666402600316520ustar00rootroot000000000000000‚Û0‚à0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA10 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Valid RFC822 nameConstraints EE Certificate Test210‚"0  *†H†÷ ‚0‚ ‚¹Êý˜D!AýrŒþðýΈþZL+¦‚b’­áô€Ýuo½ÃRxf,Ù£¸ÌR·„’–~²j®,¢&pœÆÁý‡óIØ(?œ(J9¼X†ö©æîn¬£k >Xamp¬aÃ;z‰6\ÅÝ\3fþ»Rª'Œ¥Çø4 ^È' ./¯ëˆ€&Ø›¾¶@ Çñ‹ñ5£ürüBU¾‘;0Ì‘= =>óækÝEJ†ƒÐZÃSëÂE-Gx·ÉLÙá¤#ÓV­S‰k«Tøms¸Q,8YF ÔHô«Ó}A”‹ëZAåF¦ YÓkR¥ßJºõµà‡Ïp* “£¡0ž0U#0€ÈjޱKª¥ˆ¸§‘Ûê3JèÕâ0Uf £/ è×Ê-ìî¢BÉgcÔ0Uÿð0U 00  `†He003U,0*(Test21EE@mailserver.testcertificates.gov0  *†H†÷  ‚=/‘{Ϙפì Nì¿DË*Ó…ªÖQ¢ ÑÚÅ¸—7Æg=!yhÀ8`?áÅZUªÐ8Ù7*ÅøDœ§ojz.TXf`~«ŒS‡k|Dó5­E¦v?n锓…£?¹ÍRŽÓ§ÓZ¯ü‹þEE‹±ãòõ ä*‚ I•<ê²>Å<Ôxxeq½‚b@ßкu¹Š_àâ&17ì¤oWU5}ŸˆmÕzÄÉæ2 ] Ú(ÿëÙ˜Hû^àiU1Ót[F ùóÍl‹ƒ‚´'íY"Á×¶+áž´˜hÎQÒq;û8WÔºSüÑëd둺hÊ1ÌÞÙcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidRFC822nameConstraintsTest23EE.crt000066400000000000000000000017241274666402600316500ustar00rootroot000000000000000‚Ð0‚¸ 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA20 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Valid RFC822 nameConstraints EE Certificate Test230‚"0  *†H†÷ ‚0‚ ‚Ç÷³›‚í“\¼,é•ÓjÞéÈw7Ó-ú[·mNxŽÄk2í)jƒ¸Ç¼ 6w›GÅ †ð[š(–/&… pn'6¾»8£Ù›\xôøBW™î&®íæ/‡ÇØÊ¤A±­é:Ö§¥¤ö¥Â¾ôòµDòbŠøKÁÐ]ƒ›¼Mtµï&–ïy<þŸwgxÐÞlòÃÀgS‰ÃÅw±øÊ±¬Äw›¼ù¢€äMS–ÜéÎô“i¸R³FÊ ¾§|ÆK‡Õtª’6P@»ò¡†ùÒBbkö¹ù–9Ýiœ#²4£L ¢<úèb]LÕêÜ8êÔnvÚBi£–0“0U#0€Q€ÍúIrH<íN ÎÎ@ep 0U¤8nÁ/]®õÇÅîÖ IK0Uÿð0U 00  `†He00(U!0Test23EE@testcertificates.gov0  *†H†÷  ‚Ù4–H% Dž¡Ýï+¿ªeÂ1ÇqÕƒÜù=© §Šú~+Þà·FDÎ8ðæéx-¦È@RÒÚSÐ]cs‹c~)!3è°ÌžØ±[ ŽÞv÷_¿àHþA›îñ>™=y‘è 1j(©×o7³+ñŽ"9Êã:õ»ÜU:¡iÕwoCQ/'I¼Ê»Ó˜ägb>q=Ê×C,ù¹î¤¸³¿±Âq D°]ÐyÏ“-ˆpŠ;¼¨œñ¡U…IŽV³aÒÊeåD|Í™šß¹r¼œ†WÊOþ ¶F­³yÔþxFöÝ j!¡Égz í¦ÚæþWÅúG>°«!certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidRFC822nameConstraintsTest25EE.crt000066400000000000000000000017371274666402600316560ustar00rootroot000000000000000‚Û0‚à0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA30 100101083000Z 301231083000Z0k1 0 UUS10U Test Certificates 20111;09U2Valid RFC822 nameConstraints EE Certificate Test250‚"0  *†H†÷ ‚0‚ ‚õàMŒðÏNAC02Fj‰µÜCsûö悊\7 à„åU+BXˆ°r«rB‰Ë¨×VµÕë#ý¸!ˆ` 2/륅Y«Ë0øMÜ>}9aÊfâ†éÓW°Fò!£ç=£ Ð~D¾µ\î«Ð S•²èï=Äg”“Ó ç¹+TRt2¶¶°Ïͪs7úH=)îføÏˆ]Si9|G|ÈÖ!ÈŠaO–ᛨèS˜œ§^ÕÓV´ÈG|RÆZÛNßxd­hÀ¢7–/öÂáfgþ%£(”PûËõžK/·%ñÿà 7¶s”M”–2Úòrƒ}ú Ne£¡0ž0U#0€šº9MÚ!u¯êAø÷þ¸Ìí}\Z$œóß²t å`’6ž|X>(î%<¢ Ð@&vÅŽ1·x"Hgh«|Öá°yn”8As¸ýwoQ~@7)@ãB’e Iµë¯N“°ü!Á¶í&[u ­ÅƒEÉy*ån)ö7†öX´Á9-"i¦ÜValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt000066400000000000000000000017051274666402600355460ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚Á0‚© 0  *†H†÷  0g1 0 UUS10U Test Certificates 20111705U .Rollover from PrintableString to UTF8String CA0 100101083000Z 301231083000Z0t1 0 UUS10U Test Certificates 20111D0BU ;Valid Rollover PrintableString to UTF8String EE Cert Test100‚"0  *†H†÷ ‚0‚ ‚ÓþÌ);M¤¶£nî? ;΋$BEÕ‹ð㊪¼Jû.µÑBÄ[¿«qdÝ_»Ü­éæ”û¬-M¹$µöŽˆIY¨#† uª4êD·ßƒðÔŠz¯(pýò/ïsVhÎá%̆&1õ¸ &‚ou7ç좉^¨¸ Aüp@L›¨‡/¢QIN®í¡èµŽÒy&Ãáž!˜³µvŠ\©¨WäF|²L.K}ìjÇ¡½ƒŒpH€½ ÃôÜ3“µm$ü‘úØÛ©܉Ý>ù#·—êØÌ ô‡[ߺ»S4GR0L‡ÃX¦iï+n E„ @-ÓiFÚϨ,× `ÁbÚß:ÿe©ßÆq-certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt000066400000000000000000000016531274666402600331010ustar00rootroot000000000000000‚§0‚ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20 100101083000Z 301231083000Z0p1 0 UUS10U Test Certificates 20111@0>U7Valid Self-Issued inhibitAnyPolicy EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚Ùô¸¯0òŸšþ×ïiÿ…Qçö’)³pV_KðçoØ2WšO!©V€*ü´<\æ^ú€åêÈB³TÒ ''ÅÖwX9¤¾ÆÎønÌæç¦¾U{¬ôWL94â ø>‚Òºú‡$á“™xO—äJkoÒüÔ‹­xäÖ‘ŽŒ¸(QW²íD‘-*ô þ‘û¡4Ú9LÚÈÔ1Tž¦Ž9Ÿ2ŒR³?Êõø`¥Q|§‘iøè×sóz(œ;,W‡»ìðõ—РÎç5³“²Zfõµ¾8Ò¿¨÷ásGžtqƒëª‡™zrrrïº#BÁë1§È1—ÏxJ1Ö*…£k0i0U#0€ŒÜß~dÛb¾ÛKQdŒjfØ\££0UÙ¥ Åé·ÑÎöC×N“\óXP0Uÿð0U 00  `†He00  *†H†÷  ‚#—Ï?•hïR=EÛŠ y^TºxôŸÛT¯ÖBfk|{=%Ñî«{Ç’ËôPþæVdòs6ÏÒ”¤­È6VŠW¹ Hëì“ ÃãÂ>»Ýò_2EŠ­ÌçšÕ(Éä Êß&×7eÄ‹`ì-:-¦èÖ`DV(-,ÌEŸƒ.×J2XS!!¨›uléhÞ9Ë…Ã=¹¾ýXEvýõ°UÃso+ûï*ErRɺÇ|é«èQ»@•¸‚Ës‰°³ûf˜¼jJžjÛâ` Ø…4©y8€]”d ‰.¹³XxK$‡Õü®TܼoSî_cÎ5Ù-T²˜èFcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt000066400000000000000000000016531274666402600331030ustar00rootroot000000000000000‚§0‚ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20 100101083000Z 301231083000Z0p1 0 UUS10U Test Certificates 20111@0>U7Valid Self-Issued inhibitAnyPolicy EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚ÒZOÅR Ûmð¾Í°y‹HÖUgh˜Þ®9=BV"›âÞ¸kߣ\2Т)2°µâ´‚1/¸-Uˆÿð·XÏÇY‰Qà¯,ﲑ%‚z1£ˆÝ¶V³2D(gü£k<ÆášoãÕ¼ŒžS\z£ÃÞ®çqéÙºf•åyÐ sã:óëÊÝO_âEݵ)Íq5äPqéUEŠgØá¿³ó¬#¶¾î»%*XÕd‰ÞÉ]ÎÆÙ<ûÑ.as$b(=¥”ŒTÅ5žÇþª~iý÷n±ïŠF‘ŒØÝÄy²c0.(Ž÷ÖiœŽkE#Œ",ñ"âV uÃ~¥A‰ƒ¶Ïu—£k0i0U#0€ÉÌ?ú[ð¡ÚÕ7 ›Î˜Æz‰+Õë0Uå:Õº©™Õôª–ûÝ8yÿÐ{%m0Uÿð0U 00  `†He00  *†H†÷  ‚0Ùw(¨7Ã>Üv1¹„¾ªq‹:¼E÷…éNP ãÐTaù‰še¨ýð5ÙŽAÀà\ ;t0t¼ºj`‚ÆèsBËuøÎóNäþWv³°¡éuû7ââ÷B‹BhŒœ¶<ݬø™*dÚq?®ôþÚiç Ô2ÍÙ±è”ÞmËúoIÞìT—£¡Z`î”J~“ù¶¶…™¬(ÆdB$„ÖÂ< ¨×Ñ@D/âPÓß›³"?ÆËþNGpU\@ŠãÓ ¯¨=•OpcÛ0Ç•.w?Øë-Eî/Mp÷ÐÚ«¤þàýU¤Ì‘zŸs¹Þ÷²ñ-sóÉzîLcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt000066400000000000000000000016651274666402600337500ustar00rootroot000000000000000‚±0‚™ 0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA0 100101083000Z 301231083000Z0t1 0 UUS10U Test Certificates 20111D0BU;Valid Self-Issued inhibitPolicyMapping EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚ÎT Åä}™–v ûå°Û •úÊG\º–8}ȆêÀ½„AîÊšûyFêœÃž?õßÌöï9ºIøÀ,= ‹•úC—sõ¼±¶¿À²®›4pXžüîõR5ÍE—MƒŠbj¥¥`*Úo‡¾и¶C7f3ίp޾+Z•œ³µÚÒ¥ yEÃôjNµW1HR­:Yù)”‡§:%Á!YNåý²5œ¥¢pÛßHÒ¾îþ/B²mÜu¬å Àâ'üÕ,B÷Ö<¾ˆmˆRæÊBD ¶M¯¦ci?°¼˜£ýGWI! mPäiÜ4÷Tä2sŸÑϲyq¶ßK'±4Õ¥_+£k0i0U#0€óÍ?ƒ0ÓÇbÚæÊl¥±¶€Ë0U-„„ÿl\‚D>S†GÓP2äý´0Uÿð0U 00  `†He00  *†H†÷  ‚D¥Ã¿BlŒ >²öÅRÉZ}ÅjWâ)oÙsãsnSÙŸwœÃæ¿}+™ßJèÂbö`YÖyCÞ/²çžDÌy#ûZü‘Iÿ~ ¶º³S‚jÐlÍCÕ#›í®-éfí£=K€•Ý£<›Åg‡MýËE½][Áz¸ 6J·ÙuáB·× bQ;Œøp%²DãccÇJ³ 4vÉaj窥ˆ™Ûüëó2ðÃ_ÎW"«).ÃáL†bG €ˆ ÑåTŽ.Ô÷"'ÚQ—6Ná*qKŽÙuë4ÄßPBOoÛQ×nƒK„i†Ü ÒÁŽ0Ò’Ã]Ë‚¡^[’³†°certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt000066400000000000000000000016521274666402600333410ustar00rootroot000000000000000‚¦0‚Ž 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0 100101083000Z 301231083000Z0r1 0 UUS10U Test Certificates 20111B0@U9Valid Self-Issued pathLenConstraint EE Certificate Test150‚"0  *†H†÷ ‚0‚ ‚´ÏÔé‡I/¢ô›ßZQbß^ƒ#¾w±*ôeHX™åL˜T aFp3ø·9æÈºV~2gú𨃠ÉN[‘·å¹ÚÚ_VÿQÍd9´NAó  Zrne%c\L ²ˆÌÈAD®GX ×3>þ4ND6"4ùÊ1ßZT{l¯p+ ?–£·~ücµ(°µò:w—Î&ñ=& ˆ¾ —.äŸ[2m éÓå _ê WJëP•˜¦ª²Ó[ª¯G ?ˆ¥S¯ ÿÊÏ î%ÈêE°¢™ÚU©‚ê¡ý½­0YȧuªKfæ}ðÄ8…k¸AÆü£ßH/©¾MÎ-­Å™£k0i0U#0€€ës¾M™ž”½KZ÷ÏWwtÃ_w0UÈëÙXÀîëÂWmš}Ø¡·a›¸0Uÿð0U 00  `†He00  *†H†÷  ‚‚ªF;vgÓUÀZ÷î:zäodýœ ÷ÇîD*å'ØÈ[dIʤĺt29Ö‹y€®Ï·—°ð#Ôêðd¥NT2Ê^(¬¸½ìƒìIàyöÎL,Ë>Ê[”{8»Š<µaâ—2ž+KŒ‡šLCU ±þûÇu=ˆÓÅ™Ge7(öB8sfÉCøSA*yE+F®Vc¢±b.™k-`Ý¡¿Ö§¼½`jŸw¹5"w/xÃê kÍyHF%÷P;¼LMØ'%j¢Cx­ÌhèLê[íðQ”7‘ST"â[2“hoÊqùò¸L«xÙHø°certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt000066400000000000000000000016551274666402600333460ustar00rootroot000000000000000‚©0‚‘ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint1 subCA0 100101083000Z 301231083000Z0r1 0 UUS10U Test Certificates 20111B0@U9Valid Self-Issued pathLenConstraint EE Certificate Test170‚"0  *†H†÷ ‚0‚ ‚¦×]Cƒ©€¸|ó]=ÂûíbPÕ̺÷Ùø>íätU@î’³j›âÁ€`g†zÌL¨„˜þ:ÏáŽ#6sWSú¦ZúÇþjõϘ h‰f½¯Òß÷ b×Ǿ„ Ãñ;Ú öVH’QÉo§Œõ¶aVø•5¶f’”Ñ[î'RWË 6K%§ºÞT¶Î ø™ÈZ b58jCW±å`Ž}¤óßv†™¦~ùÕ›´ÄpµöË}j8'ðþIØŽÿn^ìbÛ@ÆP ¹Fï8ÂüàŸ{Ę–ó£“ÜÿÒjâ4ÌYñ’Öì¿Z‰@RÊýs¿¥†û9|ý£k0i0U#0€y‡S):¾èÔå4ƒ+ÇÖ0Uçß ðÐu© Ú¾-Ó¶6’Áù“0Uÿð0U 00  `†He00  *†H†÷  ‚VŠ!ågö¾I`š©­'ÿâ „dä>aŽœ‰¾RCݨrχ•iãe¯é,L^o•äì¡„&m5XÈ+Þn%ïÕ&|™?ò*Qø…c䂃…üljÓ°Z~ïVZc.:ç=O&ÅÖ(ÿ‰Å­OÔ@P;î‹Å›êoEQ9*įèV5 Mñt‚Â?ù]± îéƒxšôG´CÌ59îãº3ªØO¤âÀîÞÛEÏÖÇ,põ‘S¾°î¨ÑŠ8(“ý^‹âç5§q¹w«E· 3ú¸l ýåÉ‹˜@1}/!#ÞýJ·°¡w[_²Ï1WD A¯w†.certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt000066400000000000000000000016301274666402600341530ustar00rootroot000000000000000‚”0‚| 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy2 CA0 100101083000Z 301231083000Z0u1 0 UUS10U Test Certificates 20111E0CU2~DãmþO9E·¥Ñ^Aˆ]O~Ž ·t¿ˆÛá2j‹~!!É*±Žð¿ŸdÅ DþWÙQYÅKc<9C‹ôopC%•w-®µWPŠ"ÔõÓ*©’èåR½±õ¼y¡}_›ã– 0¤Vèí»àÛ8׫Á× ž¥)FÁb{MÆ7· î IÒÐ{v_îcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt000066400000000000000000000016761274666402600335130ustar00rootroot000000000000000‚º0‚¢ 0  *†H†÷  0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA10 100101083000Z 301231083000Z0v1 0 UUS10U Test Certificates 20111F0DU=Valid Separate Certificate and CRL Keys EE Certificate Test190‚"0  *†H†÷ ‚0‚ ‚èíh·âoä°£°›1D]¡u~àH¡7a}5kYæ¡õèž/ÿ0ª/bÉÏYRyg‡q÷üIÆÏ *­Õ=š&–†gO²scêà㘸kŒ­ú˜Fª±· á¥mµÑëìªö)û Ñ)‡ú°kÂШŸkjúƒuÖ¸.ÞµÔÀ)À¦×@CÔçLÆ¢ªSÎte™½|A^Ú™\Mæ'I™F8 fi´'úkYFWÚª_+«* íÄN4Lw<¬ i§ù tv*¨ÀX­½â7Þ¶,SZ°AÕë÷ôqé8™ eyÚ˜"mo8¤é©ËÂÑ–“à:`phoØ›h™£k0i0U#0€ðeÚ?ZÞÕ¶H™;×L¤0UëMÇ)2°ìW{¯—p äàAã0Uÿð0U 00  `†He00  *†H†÷  ‚ ˜aP·íjËÝöÄá¡ÆLË54ˆÐGA’ÔÐQÚF ì¯sÏzFëIÖÖ—ÍmꨙÑÔ©†õå%窥ëê)>G­:˜<™‹‹0bx7ÙŒWŒ??^NpÕ|ˆÊeÕ×¾êKCÙþ)[h0ï0Êë½8Á1ÞÐ0~ÊlâYL’ ™œ´ÌãüQ›6Ö9Ê(?»IœÏ›Ðpkâ*certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidTwoCRLsTest7EE.crt000066400000000000000000000016121274666402600271240ustar00rootroot000000000000000‚†0‚n 0  *†H†÷  0D1 0 UUS10U Test Certificates 201110U Two CRLs CA0 100101083000Z 301231083000Z0\1 0 UUS10U Test Certificates 20111,0*U#Valid Two CRLs EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚¹&ê* 9œ}%B Ÿ)·ªÔï®UÝ£‚5J>–Q?²¢`éÕ¯Vbp1àd£Oõåàmƒ•ýÕuž–»VDÌ ÁRxÑJ®%D:ט]0·ÉŸýÅkü¥1bZT½åäuI†È}/l 1J¬k•eÑäˆ ÉWòΔóÞMXÌüÂ’În”N²»"Zó"‰@ÂNì¦ Š$ƒß}ÉÝâ}›§€°í8u|J)½"pŒ†‹4üý¡@àÈ÷{ … #Ôe§<—Òx™À³LÑÆ¦Ì¡§8—SÙö+ãµÇ¿`©Õ= ýnýT^œµÖpæÙÁ~¦Ú<Ö]lJ}< £k0i0U#0€¡Ö™€ãmýçîwK_ñIÙ aœdK¨ëªYÞSv«Âs·¯-—Ñkõºáe؆+au(³HŽ2„ê?:9}½g 87¿êÐtRK*Ÿ1“>¢? ÇÅSo£ª0§0U#0€ú(­AÞ*hÈ#?&Þ0UÖzì1Òš¬¸ÿzßÝ2/_”v©F0Uÿð0U 00  `†He00<U503†1http://testserver.testcertificates.gov/index.html0  *†H†÷  ‚PÀ,zà•nÁ³‘rå  ?$*\ÆS '¥áçÔ2€lðªà牔/„2~f¬àXþOÔwi<úm¤D;QþÁ<ÿLømÄËôæ~Xq¹èö¨e"¾ >`MMp7‘îÀÎÔŽÇ$÷¿ØÑÊT:*Sk-™=Ð}ÈiÈ ÔÍiÛJfÊ9M~Ç7cÅyV¨b7÷NBu籩ò+†~£hôèÂ/lJ3W# Æ‚%¨wn‹wב,ÉcØÖ§# *!ô­¼“3YQþÓÔŸ¥rö¢üðOsˆÈ»\fõ†«ö€MûÔÚ yòTE‹NáÏvl*¦&certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidURInameConstraintsTest36EE.crt000066400000000000000000000017451274666402600314500ustar00rootroot000000000000000‚á0‚É 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints URI2 CA0 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Valid URI nameConstraints EE Certificate Test360‚"0  *†H†÷ ‚0‚ ‚Ìl>뜒“§âéÛDÅõuÍ~¬R .›Öé‘Nì²ÀK B7|Ó3A35‹ém ˆ.$OÓ:¢þ‘2ð´ÙdÝßðoŠ ø°e¡Žb0`!T{óŪ8¬þ¾tÇ8ï{Æ·Ë`FÒ†íl!ƒÓy7k\îÜAú_¦W@syq`Á“ŸÑ¬ÝFû$îHSÚD€âqÚ*~å™53!¯š³Ü¬‡³‚Œ–2H zï­,EÅ=Ý.âJPÏíYp3~¨2FNQ±÷'. pýžU3„ÞQHlƬ"‰²åç7„CÄNe»‘PÍÑ]$„ŠWî`÷~¹¯üuŸ6’S‚£­0ª0U#0€Më‰qßð²úv:X±º`ÝŒÓÃ0U]ÜË“3š´"?¿CÀóÂ">ÕÆ7Å0Uÿð0U 00  `†He00?U806†4http://testserver.invalidcertificates.gov/index.html0  *†H†÷  ‚\u} Õ瘚…ˆd/± þ2Ö÷ÁOåmoìþ>uR-(* òpޱ€AcÊ@ƒQßèÌ>%"”ĬI‡ç|2\¹çº™n sØj´Ì*ŸBPcýãºÑ.èàÓ‘ í\_zõŒõÄiPHiÌ0\ÙDQJþ>Fhâ¡öFÓKLƒ1ˆñ¤òf(-µ\t7¿|ìdøì0OmÝø ­½ Y' ¿øƒ|$ “zгD73Ì·¢´3@‡æ@½?(g°$­:1GhÐ)„.¯®â»*M—ÀMÿ'ù0!@–EÔ5§ßúoïùº©xZW.cw@Kã“)Ócertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt000066400000000000000000000017021274666402600336110ustar00rootroot000000000000000‚¾0‚¦ 0  *†H†÷  0b1 0 UUS1#0!U  test certificates 2011 1.0,U %utf8string case insensitive match CA0 100101083000Z 301231083000Z0v1 0 UUS10U Test Certificates 20111F0DU =Valid UTF8String Case Insensitive Match EE Certificate Test110‚"0  *†H†÷ ‚0‚ ‚ݽ̒º„RFæp.Ê‚H³;]$V;‘B‹ µ‰Þ•äBÙ¨7“íc¶s9Ô9G)¨ëEžÉéÙ‰`Ôæ!óaŸ¼¡»”´Åÿvy½âÙ±ˆnªoò‹·•öæAõkà~çUÁIðu o^5Ï, V /%ŠòºÚ‰4‰÷U~Ax%¹öÊydsT­L'”2uØOn—Øe»Öm!Ÿ”lJ\k*6uT,‹y¢<†¡«B$Û7I&=r‰A<ü©„GÕ—Ö[à¯w- nÏÒ"cs˜ ÚT„Éýƒ,è4:ÈCßÖdªðÅó¦‚ ‰ÆëÕWX_@Hé‚”/Ú±¯@È{Ã¥£k0i0U#0€`ßÑÊ©P’!DÒwõj­¦¾x0U¬îut¢L#=ÜÒ˜¸@kôÇ‹6j0Uÿð0U 00  `†He00  *†H†÷  ‚Kú4Ê©¿Ÿ9Óš iÏõ»êÝV¥&©SœéQòÎXå#4|[ø4ÁdŒçk8yÙÖˆŽ¬DA¶¢:#ß‹%­r ­bó‚‹£^Ãø‡ñø¨¹î¢¨é%ïcüú„€ä™ä²4È^Ù³Ñì’œKŠé8e­tOñoçU)íŸAPÛõ@å;vRÀ#×*ñNæâ³6ç ‰Ïª }ÕÃFÏÁØà&æR“öMx»EßJ24ñÏ¢]¼Ûš¶¸.9(]–æ>úEª yU1ëHËœIãù÷§e·Wä¹ê<0¢OºÛµ( …*K‹¥BرßI\Z-ŽùJ˜€YÍXœpká£Îcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidUTF8StringEncodedNamesTest9EE.crt000066400000000000000000000016341274666402600320200ustar00rootroot000000000000000‚˜0‚€ 0  *†H†÷  0F1 0 UUS10U Test Certificates 201110U UTF8String CA0 100101083000Z 301231083000Z0l1 0 UUS10U Test Certificates 20111<0:U 3Valid UTF8String Encoded Names EE Certificate Test90‚"0  *†H†÷ ‚0‚ ‚âC!Þù pòFžŽ.uÕk¯ÏÀ5¹œÌ …5cÿRU³…ÙÃŽ´T¿¤l=A·8Û£I›Š?KD˜tJFeÊrŸe ­j%pè1¯Íâ¿ÀRþ:¼ææ\OråFóàõÃÑ쓪#ˆ°„w»Ñr3”ZÐ¥ Ÿ¼c.¥l1BZ"ÿ½ÿ”KÉǯÀÑ—|¢-5zû¢†‚<-ô/˜Að3F¬þ{Öd€ZÈÈl† ¶}¥ÓQ>%·óCÈÒlz~|lß"äc #Ž+QV8¡Ò ìgx"ØÒËd§cì+æw`ÁKÔëZîòCMµ£k0i0U#0€;g[Dò §H}s)Œ“ŸÕ$ã`&0U¸¨á½î!’¯M*œÛ#rÁš¿0Uÿð0U 00  `†He00  *†H†÷  ‚k"'eU»^†“ÔRkÍíÛ0ê¿À¢¡9ìêT™§r^LÁ´Ê>‡›F4»ƒ4ÌÜ|ß<¦$;±ûÍé\Y½ ÁÐvu“S„ܤÔ’7'}¢ àfþŸ! \h¾?b6´q âËó˜õwz.L Ì>µÞT#½ž ç/îåÒL§¢ M­˜•ŽFHá<oÖü…dêb3u碮£ÝÕAÐÔIv]lza×h²—'•m_CŒ/1DÙ¥wªq»´: Ít¢…žJZñ›Õ£­iÜgȔݤ¨ž–UëµÎvk3qÀxÂ÷!‰=F¡ÀÒe ÀvValidUnknownNotCriticalCertificateExtensionTest1EE.crt000066400000000000000000000016701274666402600354010ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/certs0‚´0‚œ ^0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0w1 0 UUS10U Test Certificates 20111G0EU>Valid Unknown Not Critical Certificate Extension EE Cert Test10‚"0  *†H†÷ ‚0‚ ‚Å»/ g¶@0øY“:X lGh†Âýêü>@•wz×ÜݼÀšZeÄùÞ©„£¯‘U”h¾“„†&©~6WÝ–-GLóqj•ÍNSôq¢ˆŒá ª´å•Kló¤Ö=ü„áÖTAR()üÚ7sá ¾µŒŠàq¶2Ñ=Îhõàvêø®^ކ§‚!=•ÂTW“I¡ô®„Ø¿*¡Vb«cþ"*hñ|ؘ*D&zú™OE´‡ÁøËX …€l1ý°h…»a£}0{0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UN  ® Z2ÿÖX´“ò®®T0Uÿð0U 00  `†He00 `†He 0  *†H†÷  ‚0&½„ŸaöÒ´Hñ•#žËŠ›PĬôq£ßF+ÚH´å5 î™’d %^×ä ·Ü{AÈ[e"´¿ž·]I§¸þ÷ŽX•±«_ Åà¡«¦=Ò±ð˜ªSí&°Ä^;éªÇW¦LÉ"€¿U0íúlºL-”u5 ܯ¡{?^Å]ÉbKìM¼º[߯¥?ØŠ’?È2nÄ)%3q°škBY»,®{Rè–cnÞ r•4anÑ_Ê8Î+Cû*¾Ñ¼]\$|xR‹¯ï°æøj‡…­3WÎØúsoÐô¿Ľ_ >ê¥ ©ªô2¶Äå+åqÎ#Â9@˜™ÊÒû:¾Ê„³³qPe -r)û¡‚«¢÷ “s¼¯Ë±ëžÆÞS‹èC)UÉLÆÝL·›X†õ.•¢@Žpß yH@RAC å¿ ¤¹ó»Á9†¹\À 6”‘'Ì"î®—£‚]0‚Y0U#0€H“T}Äm0ÿ-WEq$ßLŸJ-0Uƒ{™Sfd±¹iÊìšØ 8pË0Uÿð0U 00  `†He00íUå0â0ß „ ¤0}1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer1)0'U indirect CRL for indirectCRL CA3¢V¤T0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer0  *†H†÷  ‚m¨´€p¬ô±JQ3.4b¡e2”®JUÒgs–YEø/‚o^HËA òFr‚à‚pàd_ïrVüèoò¿¶ÁfíÁ­¥e Õ.öË?ƒ—Quûx8l6$&¢Œ €gú?Fñêuª( *\÷†ÿÇ 2(OßÊx8IÁ¬{<Ûˆ0E·é9šÍÃH¶n>Gò´ë„™r)Ñ—X¶ª"®‚æÈ¦Ñ@œg”»‰ƒ üsY! À­Ýˆ¢´­›"6•!‹r±¦$%šªLo›Z·éùÑæ´4í¸E¨!A‰ƒ’ïzu:é¬åÒÔd¿‰šôàØá?¹ƒ¥Âß$0^certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidcRLIssuerTest29EE.crt000066400000000000000000000020511274666402600275640ustar00rootroot000000000000000‚%0‚  0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA30 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Valid cRLIssuer EE Certificate Test290‚"0  *†H†÷ ‚0‚ ‚«Ýá‘úÀX/ÎTLé9×øç.+¶%ÂH†J¢AÑÀòl4èÅKÓÁI)Ñ.ßÈè“ uñíWØ€¢–ô°±½ÁÑàÏ6¾ˆš·®™Ø:?ˆ¦ýû<4š±`sÇLÂôPšc 9Nüì^ì}Ù`ࡱn4Xÿk”œD[ÍN®â¾+—M‚ŸéÖµz˜EIüXtM"f˜ûó¬Ó‘Ê0Uÿð0U 00  `†He00“U‹0ˆ0… +¡)0'U indirect CRL for indirectCRL CA3¢V¤T0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer0  *†H†÷  ‚2ˆ;G$ÉÎN"ÃKHꙸô½: ÝûÅs£iä ¬?vtmŠ}—’̇ ×ùà`_ÿšß¹›ÌíQ¡šó€\¬Q%#ÿ¦ !v&¬16vÝóäR\cÞÆ7« ¾™89g¤‘zÙ:2o²ñŠii¢¾´M=ø 2Œ4ˆÂÏükÒòÙKFWá:{a¡GÊbì`eZpïÈõÁ¸÷„Yv«F[“Xˆ/ QâVéNÚîèµsÇ Ff0ûæþˆÄ‘çÅDÂ/Ü¥ü4CoŽeªŒ Ïj A Ä´Ë0˺Cj¬£Jã^ë† NcÖ>9Â(Ea °î=iòt뼦¾certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidcRLIssuerTest30EE.crt000066400000000000000000000022041274666402600275540ustar00rootroot000000000000000‚€0‚h 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA40 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Valid cRLIssuer EE Certificate Test300‚"0  *†H†÷ ‚0‚ ‚ÒΊ în%ºë]»Ô @9cB%òzNÊ“”J¼"ââ©Ãc–…Dé?”<ùmè׬®¾Ç&° #¥{®.iÑ×;ýÉ•²k`©”sÈS4`á‹W‰è^HY»¹õà·XŠÊ.T;ß9£- c6¹xlÚ.ÿ:èLnÞw²:‚+|vg”–û«2V^@ú×Zšìé?ùPŒS@‘*ARCXsCE*i±§÷Æ| j)¬Ï sUøn.†TIþCÜ%Ÿ–ÍûûÆÃïgN˜ý1>¼ZìÜ ƒ>î stq—½ïäSF\œ«Šuw,{ËUè3$$sXq£‚]0‚Y0U#0€ Z2ê” ¨ª/Éã.A‚è·0U¤±E¶ ªá‹F^UåÓ|¨Hd,Ë0Uÿð0U 00  `†He00íUå0â0ß „ ¤0}1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA4 cRLIssuer1)0'U indirect CRL for indirectCRL CA4¢V¤T0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA4 cRLIssuer0  *†H†÷  ‚>Kžõ§ÒB÷ÎåŒl3vún£ÐéÒ¸„ªu~¾–${-$Aù’0ȯ ìc¼zäûctKÙ£HQ oL»hã[§O€×f@ï¨ Ñ{jccHË:œ J®…¿ðÂþâUƒÚjjõ º ¯g['¸È±˜O˜¼×Mg]' ÏŠy?€f.fâ8“ï‘‘þ©Û%]6Ó­…Í`@¾°wkµ“ÿOïÃÏžba^^/>‹†½Km/ñ‡7k0 ,¯F¥1ÿo vÙ/-Ú¹%íÇÅH%QüN$Ù3ÁvRÝÀå7J2ˆ=<Þj×Î1‹ië;§ØAâsСcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidcRLIssuerTest33EE.crt000066400000000000000000000021561274666402600275650ustar00rootroot000000000000000‚j0‚R 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA60 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%Valid cRLIssuer EE Certificate Test330‚"0  *†H†÷ ‚0‚ ‚½ó͵áÈu7QFÌÛøoç†i`6´ãZ Ó¹——W¯ÃêŽ#çúKHÜ$d¯D¤pÎtøשU}~{ŒBåš”@hj°£jŽ\’ÆJÛ¸Ä:ꧺ# ¯x8÷þ«;£0ÈÌH™Ù÷Ó|Í£Õ*ü¢˜m‘HåG\Þ)™0’ž_£Õ§ð …Í´N­»"/9D‹ê2+BãY…¯Pr}p*nÜÙÞ]Ó.5kàÅA)‘ðGó8–bÆÚüèšÞR~ÝJɆ ðà;ÏIUʱ@Üm$PøkÁsrá̼jžâÉx”æ—jd æ¼ó‚Aq˜dñyå+£‚G0‚C0U#0€É £l-wOÞBô ¶Þ*v10U–èsËÑyþ‰!¡,Ř˃'0Uÿð0U 00  `†He00×UÏ0Ì0É y w¤u0s1 0 UUS10U Test Certificates 201110U indirectCRL CA51)0'U indirect CRL for indirectCRL CA6¢L¤J0H1 0 UUS10U Test Certificates 201110U indirectCRL CA50  *†H†÷  ‚~ö¯“Fv)öG±Åu¶C/áS+ÌHùõñÃÑ}аy¥ñ‘#Ùƒ„¾{‹–6ô ÍTªr ì‘áö…« ‡´¸pÿ•/`„N‡ߨ­* §õ¯ŽkJâj ½ÃÐDUyÒµîWDî†%AG_À÷νw螣™‰¥e8+vO‚ÆÜÞö·22¹šø ¹i<_³ÒK×:}í“ØëœgÖµ„yØI lüXôKúEѤù©}³ÇOÕ33ôß€Èæ»#„ôœBÎèI›)]c’Q0º NÅ)RcWW=ú¸ýÇÞZÌù=ù¨=¯àcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddeltaCRLTest2EE.crt000066400000000000000000000021031274666402600272500ustar00rootroot000000000000000‚?0‚' 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10 100101083000Z 301231083000Z0\1 0 UUS10U Test Certificates 20111,0*U#Valid deltaCRL EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚ÁÝAC¿ð*0CpÿCæ>[ܽëIDLçJ!Ò?VVu¹ŒPÖ`Ï&Ú©p©´&«òB=T5ª:ôˆwL;º¤ˆV³ÛY5Ð'0@Òò¼]ÅÄó½Å˜‡­`~YKê‹Îg \0~®'p•̳žÕ/Üçš"[ÌWQ¨F‹5osÍ»+óÎ]€üö/‚¿žNù'€v—âÏZp]~ï°#É ·EB¸+~üU*õi5…Áf}—Ü-`ø£ï&”JñB¡U€',µÇ‡[Øé­ íó`ÒuDÛ!LÄ"Ub¾ˆô üA¶Ö…Ü‹ÀGh©¸¥œÕ]Vú+N¥46/gÞA£‚!0‚0U#0€w#åv„È”?‚Ðêt±à¤/30Uú¥@Ùîêß/åÝɇH$ 0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10  *†H†÷  ‚£ï£»lPÔ9lžæTøFnª-_2ÀO\›…Pu. ؽ—áÝF¢ ó¨@]°Î49ZûßTÄ4Ó}š^¤6˜¦Oæ}ÍhÆ(Ÿ™xdÆC¶aRÃi*eKå7Ð6£ºè€ƒâNø°L­í˜R"¡š&ÿOSÿ[€ç˜Ô*ìé–RÕ,ùCùrBAÞù'zmc%+‰©AŒ(­¢‹¹t~áRjJ/¯ã¿óNeæA?£6Ã`ØæŠ{ÐYRá7O{ÌK÷œ@ù Rú,Mê•n ÐÞw*¯g¢#ë átDªé$z±aÊÔ ËJ7¹…"}å]EÆ1] ÚIÂðÃ;)ý»úcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddeltaCRLTest5EE.crt000066400000000000000000000021031274666402600272530ustar00rootroot000000000000000‚?0‚' 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10 100101083000Z 301231083000Z0\1 0 UUS10U Test Certificates 20111,0*U#Valid deltaCRL EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚¨‘D Uc¬¾ îrÓ‹…µ¤¶žº\¡Gïʦ=|©ús M¬t?ù1d<‹’"ÎýœGƒôŒ”¼Uˆ´µàû1Û W?(=ÁØÎ%ìD¿do™ûfŽdõˆan!j¯¨þã厔b~ž¦_˜ë©*½ÅN%–(ölJÂÑ_CÀ_«Í^ +;5á—+Ùc0#§¾«ï @hÐ"|¤e£nÄf#'„ e½S…/Àt~8]– Å%Oâƒ*:¯²e £¨•íÓ åÀ/áË-ÎϬX¸ C•}¸€.[$õš“¿xqZ\ ñGž$Û Ö‰ÌÉ==IÒ."£‚!0‚0U#0€w#åv„È”?‚Ðêt±à¤/30UIeùˆoYG“Œ»ëû•è‰ZÂZ0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10  *†H†÷  ‚|éÜ´v)ðDHÎñ[ÍÓøÞ2Ù»¡†w6Äé÷Ò®C†yj ô¿ÞÆ€W«P2›÷\¢)qa?AX>СûQÑÅæå!Už¨[­ÂGêÌ逼Y‰Þ 6\ðÆeÓÒ4ÒbBxÊ–…Pq¢Æ*ËxžAçÍIß°ùY#Š¡Ù¯´–5ûuë޳ãÌÆPgöìŒ7øÏÎØl¸ÅJ©ÆŸ¬$ÑÞyŽÍûñWÜá¼gÈ0½ÉIðöcãTg¥2ÄêáÎÓÄÁEQ)®˜;ÆH€X™yŒ,_—m­÷ÄéngÂ,U2Ų·W—ŸùÝj,«*¹wÜW%Â$‘ܽÖ#—ÈÆ³certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddeltaCRLTest7EE.crt000066400000000000000000000021031274666402600272550ustar00rootroot000000000000000‚?0‚' 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10 100101083000Z 301231083000Z0\1 0 UUS10U Test Certificates 20111,0*U#Valid deltaCRL EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚ÍÈŠPpR½² ]^;¬VNÿÖ˜Vúù• nÈ*ÿ|±EN#y&Cq˜Ì\“ײ´u„µç×$iVŽ’õšBæž|Ciý€HÓŸ`LÐBe…dEý@* šVy½]ö°$scrÜ4Wƒq1W;½|ŸKv…wP‹˜}ë™û8©}¥]iYíë„ÿ(ØLühr¤ûZ©¨puYs¼QHõ^¡­•„N§q7™œNsl‚ñÜý¤¿elCÙiþòà™BM”c>‘•ÝœÜk° éÆe÷ìý̆Õb’½çä§^³>¿º'åþMF.UbMA£‚!0‚0U#0€w#åv„È”?‚Ðêt±à¤/30Uå¶öL,—|¢„èX¯z ^@‘0Uÿð0U 00  `†He00XUQ0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10  *†H†÷  ‚ 4¡vÀñ;ëLÄÕàè.,˜¤K~²¢•DÀô9‰ø_ý¾1ëïd=n˜ì¨ª(| )ËKï.>À$\ ÕÈ©,ÎÔIé…7¦âIx«Fì D«$’ü\EÃÝ[Ž,ÆÎ«ƒ­ì0:<~ÏØ^•‘ö+)rDµ¦áEUÐ¥‘#–‚GÞ)<’¨Ïk©Û×Ék -w\x…J7ÚÖo¦2ýš_Ùeö³r©•ß”U!1L·mÜ'E½Fü\s"$MÓæ·^¡øáŽ ˆíXÀS÷€a ÷HÍޚǔ§j¦ãñaê9u-—ä·eŸ»cØ33{ ÊÃÛN certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddeltaCRLTest8EE.crt000066400000000000000000000021031274666402600272560ustar00rootroot000000000000000‚?0‚' 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA20 100101083000Z 301231083000Z0\1 0 UUS10U Test Certificates 20111,0*U#Valid deltaCRL EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚ñÃv±a.Ÿ5p‹Êðv/ôQØ ßœœf’€ch8Š5…È^ŽR(†z`*ŧ+¨ GôÆœ°E‘t—ÅÅl›ô­õ*•Q3rxþùÿáý1ú1j+µ£kœ·%W&°÷:[Ò¶=xé ¸l—˜Åúñãá%[8ñ¬WX«`eð87¶Ð·TݪrR9„…WCQ«Ðj½¦KiºpN]Ø`šóÓsP›C`Ý)ó?4hÈkzªýÛì¾'uã}—˜¢‘{­”ç>¼ÿ7‡Mô…aXÛ`\WB©'¢O—Qºê1ÆÑ IL?0=*å˜f·œ7ý;ÿ£¤ }ÓFøÕL!¢  á¾VÞa:_\Æ£  Ô<$x­¯^ÅQÁT—Yð"É9üŠ>îÐnàí©AʉàGÑ")œð¦idåÀÙffÁêºk ð‘certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddistributionPointTest1EE.crt000066400000000000000000000020551274666402600313540ustar00rootroot000000000000000‚)0‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint1 CA0 100101083000Z 301231083000Z0e1 0 UUS10U Test Certificates 20111503U,Valid distributionPoint EE Certificate Test10‚"0  *†H†÷ ‚0‚ ‚ÒÃÓ“T¨O-7äeÉï\¹ ”GŸKTÙ(Th4ñ1Œ îÿX€ãá@^ì@ñ1R“©Ö‚ŸBçp’ø&¥úÒ…9¾Œ»6@%¤÷§3}T6|¨©«°¹ W1‡á‰BþEŸœ^ÞʇGM7ÚY±Ê ¾ì0‰ü ©´Zí¾è̹릴¾6à%;mfBzTx=¯îlZ ü˜\O*÷úÞ·eñ8רIg»iýpg¬& ·ü¡2žçW)A]mSÇô1Šf]À$§–s.n`´v ™”%JN†«Gr4Öpiȹò’t…æw\<Ë^µèÀ²‡ŸV>i‘£ú0÷0U#0€0s½p(‚ÒoÏÒ7íÍë#‘Ûï0U²è‘bo5Ãl*yâ3Þ ©†q~¼0Uÿð0U 00  `†He00‹Uƒ0€0~ | z¤x0v1 0 UUS10U Test Certificates 201110U distributionPoint1 CA1&0$UCRL1 of distributionPoint1 CA0  *†H†÷  ‚7ƒdä% ú¤ê¦Ð]äD« —äQ›Þ̪:³S3G7ÙÖxÊ(dÝ4€£¨z° Ïá›­U”v¾c©~qzkæŠ9 SÎ*Ü:;ü“2QN nïggIå-‘0ضôèôáÓ¿YD¿#3¶Ð å`‰’[ºŠ»Hõ¥à|’º¼ä$: ñCh„& YYìo{yC‰¾Lÿ¨:ñ‰<޾x¸.¤³¼~œ+µf»R½e›2Á:AS¿ÛoŒÃçÌ~˜Bsru…§­ÅIÁ åcÆñÎ ˜_¾õ¤ÌÚS Lù Y~õ tr)žË£y«(v¸Žeâ/ÊEÕIcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddistributionPointTest4EE.crt000066400000000000000000000017261274666402600313630ustar00rootroot000000000000000‚Ò0‚º 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint1 CA0 100101083000Z 301231083000Z0e1 0 UUS10U Test Certificates 20111503U,Valid distributionPoint EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚Ê¿+eP÷ê­8M>`ËŠ­Úw¡c®[ccŠÒ‰ÉÖ0z ôs„SøüìÇŒÎ_¼÷Å0Þ F ó[¿¯œt®9Ù3+DŒÝ¤Úˆ2ëÙà\è Ü|РªH½jù6}¯ÈO>ö˜¼%cMÄa̹±Üó÷B$c­ž”œRcñK•›ÓTxö€˜9ˆ'˜ _ªGÑñJ{,%p?MùhØ o’÷ßÒäíŽØO™±U1(Ë­M:U·=ÆB :j1‚"ñ³"A<§GÆÙ”_cáÁŒ¼ì_IˆöÊo™ÿC¨z—°Úx¢ʱVÔVÉTT»Kÿº)-3¬w½££0 0U#0€0s½p(‚ÒoÏÒ7íÍë#‘Ûï0U­¼®;ï "7"™E> ‚qÕŽ0Uÿð0U 00  `†He005U.0,0* (¡&0$UCRL1 of distributionPoint1 CA0  *†H†÷  ‚–+Êjé”­.QtLý0s.’÷çå û7JõQK‰7ßÝÀ¨1ùÐ;òâdüÞ@'ÞòDB*#ˆ½ñîv‘MH:,?k²,™€‰½æ\M¯VùçX,ŽÐqÝYxbÅÀ›neõ§ü¦SÀYdQWÌ @ÎÀPR €Ó˜„†g !ÐE ·FSQTH)b4Kž-$æ5‚ux?G€¯Þ:»u±ÚÃ)¶|ÀgŠ79.1‡†bŸ%Ü“hWªv9®³V/­ýírDÓ¡˜r’$z.Ô\¤a¢8fÓ ‡rcÙiÿËQò "¬vÆž£AdØ™IëöâG`´¥ƒ-7øH~certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddistributionPointTest5EE.crt000066400000000000000000000017261274666402600313640ustar00rootroot000000000000000‚Ò0‚º 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA0 100101083000Z 301231083000Z0e1 0 UUS10U Test Certificates 20111503U,Valid distributionPoint EE Certificate Test50‚"0  *†H†÷ ‚0‚ ‚¡È/awÛ4T ¡ˆø;Ð¥gþ!OÌÎ’ ÃCvÉ0½Ÿ”P©êK|vλë=dFñ³î6+^KZ¤øÉÞ³ÿc6ƒŠâR‡Ý­~ˆù†ƒÌÊ& ßñiøkm*¹[[%çÌ~Ò]¯åNM Y}±*õ,iTËBŸ'뿟À¢Ç™›¯¨ŒÍêƒÏÍZŲ«^½Crgå¼™r,B¿xÔk;6Ð×-§!ì|d%r¤ýÝ`¥ /t¸¤ „‚˜G×ô†gkÅl=rÞtSŽ$®Jšú[&@ºWÁ4œQÞà@¨ç™Ûž n.¼C™= ܤ}Эù5Å£ë`¡óP¡ŠÓÖJK’V´˜&vÊi££;nrŸ!Ä|LÀ´s³ì‹$ä@öne®ˆd<徭i[渆A) ö·iømNË|u­yaå9Âü`œOAd^,ēѽXãFƒ3ÑœùØòžÉ² »ñm†ë¥U‡X­certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValiddistributionPointTest7EE.crt000066400000000000000000000020551274666402600313620ustar00rootroot000000000000000‚)0‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA0 100101083000Z 301231083000Z0e1 0 UUS10U Test Certificates 20111503U,Valid distributionPoint EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚ªµ¾™LºsqÅ=‹LfJ:ƒì‹ŸÒÏ Âÿ¶ò|äÒ?:à<å®Tæµë·ÍÒÑ–A…÷+á­¯ÎgóTxA#¾3‹z[ªn዇wYIJMÇ0ú%uó³­åÔÇù¨Â"Ää¬È#àa_\‚ÅYêwî f3kÍü; M¥xº;¾]Wˆ÷¥ý¯§ ZÚ:ðúÂæÞp÷Ì1Góß^¤·PÖŸ•Šu™ç:aGœkÕšW)N';#Ix«”éKÞ9-ŒG,üD;Û”½‰jÔ*‡XFX8jP'JÓÛ>ŠBèÿ‘ˆšsÒߣú0÷0U#0€DlîÛoëNIxþÍå ì»`k0U xg»a°jG·‘ý o“1È÷ì0Uÿð0U 00  `†He00‹Uƒ0€0~ | z¤x0v1 0 UUS10U Test Certificates 201110U distributionPoint2 CA1&0$UCRL1 of distributionPoint2 CA0  *†H†÷  ‚Z/ äw„â“xДò—\_Ù`öwDiøA‘<Sè›ÑšŽµV&æ¨õØø©°˜é÷z{pÒ̘Íp‡Z\ÔV¶Þ›9…D¡”üÓõ,ÎþbœI˜bX ‘Ú)CGâ<'»•[.Gš¬¤Š¢X]$ 9Ô¥—@fõÀñ‘úîhXèOûQ;õ`\®©Ä~%@â aô„v"ÂE6€·Õú:`¾‘PÁ¸+´ÍKJT`÷íŠQ·)]1_O•Ïê#/8JÛXûº˜Ü€™ù¡”Q3’Cçµ{ùÎ Ç{I?hRõ±'mt Œ¬sÁ<5 a&,´¼­Áæö«e/ü3ézTý>ÕÈ—ýO­EÚ¬Ïó£s0q0U#0€  zjÿj…‚$ÍÃ&…ø¿Š70UÎÁ& ŸÈŠw««‰'tå]‘,Ê0Uÿð0U 00U 0  `†He00  *†H†÷  ‚ŸÎÄZæ<ÓF±RÙTÒ]FÿÜãçÇW‹Ý|VŠc—ðp1Žñk¡Ä[,Î;´(_fzð¿Ç­ÏÔvcÛ“¤k>®A2É©,Ì"ªœcª£{'¼ÕÅï+gûW…òÅ\:¸‡X¯·§D“@évIîˬä½ÚKS“©Ï+žÝ•º$òߺM.¡*Ýë<é½é“ÄÑô@ ™Q´Üг¿”Šà@ü)Îê9Š“UÏIì.Ð_žÛ˜t/ÍÖÅøÆY/¶4» ¥K¾öebÍœÚj牒Y4Œó¯ÝÂÞQã G§ø/Ò¨Þ×)€Ý¥}Ÿ É·•®›Mõ—certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidinhibitPolicyMappingTest2EE.crt000066400000000000000000000016521274666402600317500ustar00rootroot000000000000000‚¦0‚Ž 0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UinhibitPolicyMapping1 P12 subCA0 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Valid inhibitPolicyMapping EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚ðÑ6‡#2š‰KÅ×}ŠyÒî%ËòÓZÖļ_[¦ R¢×ʹÐY•WIë-(ƒVlÒÌ„LÙU¢ûG,ú­ÑÓPKzÎã!0tVŽ>zBÐbLQ°RΪFX‡$Ÿ€g0:ƒ#°>¸0\N>Ü£½bÔ°l5ãõöR>d"¬g´æŸODkd5P Jš !ümði•¸0ßÛ‹÷*¿›ünqnW@N€!7;Gëì"!µw¯Y8qÊ©V}Ê6\_•%4]Æíɶ‚Ì€¡ýZ®&ݬnÐÞÊ¢Úå!S)ŒGB1SŒiáaíë^}ï»Ì4VÛ¹~Ú9£k0i0U#0€ª&”d~¼]`Wüp•flç0UÿsjC`Ó´¹F»ªÔ¯rÄ”Ù0Uÿð0U 00  `†He00  *†H†÷  ‚6ž–L#Y í®l¨±ªÖœ4©•Õ©#w!O÷7r¤ 0ÑÉ x‰ÜºÇöó;´veyKåP‡<™s¥ëüdg›º“wø;Ü,ÚÆ¬kÆ=qˆåeƒ˜¦”…-î‚#&&é,5R¶v=Æ=`¯¿«š_Y%—Š ´"æ _(lUií©cÐ|é¹ZU|J·#GQ,bÉ ã Ó¨È»cWæ§ë—_—7 ¼DÖÅIÒÔ– —ª»(÷6je£¤õs¨´Û> Ù|Öé C'‡Ô“⌱ô÷µÚ.KçD¾Úê'æxÏÛ‰‡göô«` ªtƒ/‰9ŠÏJ)äzçS°certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidinhibitPolicyMappingTest4EE.crt000066400000000000000000000016551274666402600317550ustar00rootroot000000000000000‚©0‚‘ 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"inhibitPolicyMapping1 P12 subsubCA0 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Valid inhibitPolicyMapping EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚¦ ël®ïçÒc9£Ò}ðêá£;úØ„ü"ý@•މ#ÜTú׿ÜÉ; ¾ÉÆq̤|Ž ½¬hÔ”{ýå+UFàMÍȘǃ„㋯’¤Ç¡ÞvâX¸‡xN ºòL"Eþõ+‹¹G¬Ø«¿Ô¶6}¶¢çgU³,ì‘£ÓiÕ¨;3Ø‘$«ºW¤ôGR@B;HT8—'”ƒ¤t½Øç6.eï¡ µD©lôë·…E-dRU# Èt=jºvälÔâhˆËs/ºWfÛCcxu¹;JÞtKB_õÀé®Q™ÀOAˆ×šTpÝÏû~bð`_Š} ã¹£k0i0U#0€×€\‹ŽAvº µsqè£@€tÑ0Uw/z s†2Qqêis«8Âѧ ¢0Uÿð0U 00  `†He00  *†H†÷  ‚¹飈䳅oŒl`þH—µ ×âxE:‚hÇŽ˜W‹=U]¶®Ò=e©ÌM±¢8Dá ½®5 „·PЮ>Ɉ' Ãšåõ0+š÷3«ûdˆ¼²ÂûºK-stÎ)œ†âUwš^ .ýH_ÿ¯1J2ÃAÖõ! {ÆCU’“ sϪrÖ°øÆ0G_,^Te¢ѺOQ¥ªêÙ |A«xLçÿ3QcwÓ ¯‡E'ÍÃw»pt)ƒ/®¦²ÜöˆÉÑ¢QÆöDˆÍVãôðŸÄ~ÖÇVĬ^I÷sÑ)tŒÁU©bœåxxw¹KÇ-'­$ÉVì®ÁžD‘ícXò1SûUcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidkeyUsageNotCriticalTest3EE.crt000066400000000000000000000016441274666402600315410ustar00rootroot000000000000000‚ 0‚ˆ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UkeyUsage Not Critical CA0 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Valid keyUsage Not Critical EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚·³¼ÀAÌþsÍÍÄ[\ÜØ‚=ñÝ”(¦Ôç«”x]#Þ`œº(Î[ÓÌ\y@\œÎÞ!ú‹‚Eñþ,”øFW4í™xÃÿCuÿôÊ›4w‚¿Rñ~ÌéGâm©™Ëà?bê”VS¥V~…üÌL“u(O.HR‹ï­™ÝÈI à$¢Äl\øAY?mÅÉýÕV±ÒHÍN¥—$ÿ—ø—Æâ-@›(pD6×wCÚ\Ï:,Ó…÷þâZÄtqÕ»À|*®t“BaN‹Ò’|`™IØHu·ð2¢HÈö)³Ó¥f~d“+‘¼jšÄõ[¬Øù»£k0i0U#0€ÁJÙ´+Åp~ÎŒ;bXå»—+s0Už:ycÏ.Ëw%Úæ¥V‚àTKÑ«0Uÿð0U 00  `†He00  *†H†÷  ‚7Ù¤‹Îa3’pÉr¢ÜwP0,E ÆiÓ ª÷¤’!bpSŸ¼Yê+À=YJ)2à ÷}!$±Xë f7{5•ß~¤ª<•Ì,Ô¹rµ£z±;Ñ(AHP¯æÀ ÍfäE|.øVQb¿ë£|®EE%V¡$'lÐtÐkɨ=I Ü©ˆ }_ƒbÊæ+’8(YÀ´um; öue ¿üþ2'âÌMîÒAÌM:”¬‡ÕªËVA:gW&¸.´Y¡63ïdµ4(¯·0¢<\øÚ@ò¬ïF~¡ˆ‡ªzj«`@Î:üŠ#´dc¼0`°DL.b”Mcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidonlyContainsCACertsTest13EE.crt000066400000000000000000000016621274666402600315760ustar00rootroot000000000000000‚®0‚– 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UonlyContainsCACerts CA0 100101083000Z 301231083000Z0h1 0 UUS10U Test Certificates 20111806U/Valid onlyContainsCACerts EE Certificate Test130‚"0  *†H†÷ ‚0‚ ‚Õõäk—8j‘Ô ùÿq2kîdþk3TdmÆÊ/ íà‚ÔÈèF°z°½†Æ:lâüÀà =K¢ñP”ZÃRùö¤V%ÇkLÉÈôœêsK}Y©Ì©¾ÂNùS@ß:ïJ¹œÜs¼`©ð;$±êåà×÷à,¸˜eÁqôä­,NZ³?O‰{©—t·¦¥@X“ØÇDQ0Uÿð0U 00  `†He00mUf0d0b ` ^¤\0Z1 0 UUS10U Test Certificates 201110U onlySomeReasons CA31 0 UCRL0  *†H†÷  ‚L"ßùˆÙÄïš7´È§½›Êг˜}”Ì Nk§Øˆ˜¦øàö+,ûw†5k×Heáÿ{ ]Ú£!òð¨V_¬4Å—ˆ£šøÞäýwrUõ-#Ó‡‘佸h˜Ý«¿ T¹Ô@ ø=×N}0&Õs$œ ½vr ¹þ¬p’·ž#Ap”\xnsè WÈÍQTÄë/† Q…a'V¶Û1íG£†} H´x?»O:ºv×U¨ ‘Q¿A]é¤+ÎK!Àa½T‡$Iœ‡Œ ,ùZ±™MUÊRC_^ÿ?'m Ž ~XIá]…7ږŤ̩y>hÇÙrB?†bcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidonlySomeReasonsTest19EE.crt000066400000000000000000000021771274666402600310610ustar00rootroot000000000000000‚{0‚c 0  *†H†÷  0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA40 100101083000Z 301231083000Z0d1 0 UUS10U Test Certificates 20111402U+Valid onlySomeReasons EE Certificate Test190‚"0  *†H†÷ ‚0‚ ‚±†˜™ëíU|ÎIŠ Tc»n'’õƒNÞî<¤@NPeV¶Þú7t:KÚmÒ¤Âw‘bn>B‡¨o"$!Š™ ÄŽ÷.³)øBá¿Êw]Q¸%™È r<Àâæ|ÀÔ×]¬„V-Ä'ÿtÛ¯ÂCöÛ_ßÞ3¼¼ÛHeÓ:2'—÷÷ðk•¤@š¡9Œ$ŸM}âfÁ)ãw¥‚æiöZы߉|š€DÏl;Ê{ºýœNná)45ßtaeùÃâDÇ×ÊFü‰0ûa^—K¶>â8©vÞ¾lã/ÿ7±ÿî›|ûã‹%a"_ý^2FäVþA@8ñ1$œ‚¡¦^6bHf½¥£‚N0‚J0U#0€¾fÜ ;öÓˆ4‘S& hnÉ0UäCt¼ZÑ*fä,ž2“Ðl†nÊ0Uÿð0U 00  `†He00ÞUÖ0Ó0g a _¤]0[1 0 UUS10U Test Certificates 201110U onlySomeReasons CA41 0 UCRL1`0h a _¤]0[1 0 UUS10U Test Certificates 201110U onlySomeReasons CA41 0 UCRL2Ÿ€0  *†H†÷  ‚Ju¤uãHhêÔÞŽ{b‚N«ìMoÒ¤?Î1 È0S^HÚÄÂFyÉ[¹»é™ßI^=;‰Õ¶ë#ç¾nÈà)¶ó¡Ç x^ëÉfåü·åq\°v÷!3RаföIžz©ï° X YŸn¡ÉëÇŠQLnMœÌû--P¢<×RX<’Æ«ÇKF»¨7Ž”ÅùëvÕ°»Oh¼ýMêY/´ôDð6EÁäÄà&+èà3qDž0ñ /ÄÐa]&Ô ŠµÍmñâ…_þ+rKÈ(ŽS¥&c=°ÿÀð} ×)Œ(Õå®Ý\ Xû(F0ÂÙ©Eðþ•J²r±ì¨¿ CæÀ×–ŠöÅ?£|0z0U#0€¡í¢ó5T¥Ÿ¼cæGjS$lJ r,0U–’ˆ·6-®&' † KðÐ|0U 00  `†He00Uÿ0ÿ0Uÿö0  *†H†÷  ‚VkæÄ4ó~ß`iö'0Þ `Ãø‡i*–ÍÍÜtÌ™Ãͧ¨¡Tå'>lŒ£’Ŷ}Ö…~š1BU‘#AÆ%Ø*{gÿA9aê(Íø÷"-ø¥6~Bn_c˜§OÖØôíNZS ª¡zŸBcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidpathLenConstraintTest7EE.crt000066400000000000000000000016351274666402600312740ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0 100101083000Z 301231083000Z0e1 0 UUS10U Test Certificates 20111503U,Valid pathLenConstraint EE Certificate Test70‚"0  *†H†÷ ‚0‚ ‚à\þïyËLÔ$çwõœ8ƒRÈk¹Ì5il’ó4)ãá.¨{;Öô^¦]œ©]Ìæ¸Q†‡oïbw"öUZ7HªÏ“fð$Ü:ö|°É’'…ðš·Î[›(gÀÆ…`èÜléu,Õ5ÂÍf]v¨6.,øÐ)ÅABéÓ–ÿ‹r€8°Høq5ZêˆÿâLk û%V°^¥<ÞÁ²5…Vô|ŠtÙÃ)½¤m87°k4”>Á¾5A«ë\#D «¶%¤¶•»’D¾{“IAQ!Flcø B¿±u-èAè.ç£ëN5ºWvx4ìÆ.:§ù¹A‹kßæUÐɱ|8Ÿ£k0i0U#0€›+²J<ÅnPÉ"½cÎ ñŒ=ú0Uy[_'6§®Gê¡Ý*ç’2+E50Uÿð0U 00  `†He00  *†H†÷  ‚n»ktºî2jE+ãjj³”òrv¬LQéGIUÔ˜Ã~®Ìoƒ«˜#®éÅfÏ¾Ä '/•U `àÊçŸj«õØÝu?µ;îÌpµàD(öÙòG€@ÌAJjÈå±ndyÏE§×e)ÿÚ1{}¤È@Ør–C[LíMõÛçÙjj£,0㑹hS•žHxb)’|S]óC©\Æ–ÔqoÒHjß´%âfXwõœžA˜)c•öÖM벱ʒÝæRl–ü«4Î=êdmb-?œW5^•»4^KÀ×)ξa ,…=£‡6\µŽB¶jï°$eÀç܄ɧ×ÅÉcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidpathLenConstraintTest8EE.crt000066400000000000000000000016561274666402600313000ustar00rootroot000000000000000‚ª0‚’ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0 100101083000Z 301231083000Z0e1 0 UUS10U Test Certificates 20111503U,Valid pathLenConstraint EE Certificate Test80‚"0  *†H†÷ ‚0‚ ‚½á?V«Ø3˜ˆ–"¤5•¶Ì¾-*›5´×ڂС$U<Ÿ,†}qurWRŽI ÊÃo…äVP(P-@)øþd6 øh<òc)cìàkZMjÕ¥"£íÞþvn¿b•xr½ð†ºÒ\Ò*Š!+'%¥Ùaiñ°¬Éú:.Zzòjâ•ñ{-ý謆Ê$ÇuM€œxññKðÁÅ3bQ‡ïµY œºŽ·¼å‡^cÔá×_@VÙÆ (“)ìTê°éýD\de—EIr¯aTgÓ­&™Dý`RƒŽ¥certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/Validpre2000UTCnotBeforeDateTest3EE.crt000066400000000000000000000016301274666402600317310ustar00rootroot000000000000000‚”0‚| 0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA0 500101120100Z 301231083000Z0n1 0 UUS10U Test Certificates 20111>0<U5Valid pre2000 UTC notBefore Date EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚³˜Ö-} »1ÅìQyKê‡,ôES‰åo_4)ƒÊn¹¬uëÍëÊŸ„߯LÌ.gxKùé›%ÖH(Ê„:N½#hh™Pbi£ÌGDB²VX{Òíˆh©7%€ó±hflÞIqF¦`ÜrÇÙòAY£åÓj”žG96òT…{sÄçŒÏ_Ðžë¹ #G¸Õa±u ;9œmÁañÏ,7yƒbE_É»kj“7ªC¢5}Š(àŸ`;:ïVÛ‹!BAceû³¤×Ú”Tè/ø6 5`Ûîz"¼ÓQGïéÏÂŽX^EÈåÑ <Ãi-ôô¶÷Lß]Ý­äÓ£k0i0U#0€X„$¼+R”J=¥rQõ¯:É0U@o¨¬ÐêüPÙ]ûVu%`Ä›0Uÿð0U 00  `†He00  *†H†÷  ‚ç´ÊÚ \Ò’5™Öá#éuÂ,ì M½7üx*ò˜ÃÄý•4ñ2õx`3‡h ­îžã ƒ0Õí4§‹ÑÞF#o™;bŒ!ä$˜ Ù ÙòmåÏX$Žª’Ð)ÚÌO2îß›ƒž¤:ce˜º+¨Wt&eÖEs1¶.+[>&%û–»3ÝdDDõ²u×È£~KŒgî¦:‹†Û…§qüU‰ÇõèÛÕZ=/Ä@„5ég”ßÃëŸP$lø@£¥5‡þìsçMâO1E]!LNÚí ¼¼0>2uIÖ¥W vkº»‡P^Ùq~ì/Ū¶ÆY¨–k¨è®Ë 1x <"{â¬ì7y…˜5!+¾Â(•ã8hI€â×9Q ••Þ$ß4^Üóž_F^Û™¸éxÏÕHËœKvEø¯Í7Á[ `S¿Ò¨Ë#òòz¾©qˆ“žàŒÅÿb•¯)û‡certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidrequireExplicitPolicyTest2EE.crt000066400000000000000000000016251274666402600321640ustar00rootroot000000000000000‚‘0‚y 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy5 subsubsubCA0 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Valid requireExplicitPolicy EE Certificate Test20‚"0  *†H†÷ ‚0‚ ‚ÎpnÃå¡Bç¨p X:Fé@¥(uoPiŽ5¦hÍÐz†9­~[£/ܪÞ±&̾çý¸éc…ŽŒ2Šƒí-ìÏKžAç˜ïù´IÂ¥†Ú"MÌrºÆ¦ÃšáÉU³Á{ÿ̾á÷&°)§ÁŒáß‚ qL­”·~©Ol½'°|Ý­)üFUp%TUP†u5þùŸòô LýÖ0FÊï¼ß=¤lËPõ‚ÆxGââÀî$Ȇ£5©V±yaMãÎÑ»î‰ WñôQ³Â‹::I©´×JG‚pÞD 4]ªy|-«ø¡ZŽ5}ÈZ7üL ÀýØo£R0P0U#0€úbº½~^_ߺ¾y7‚Üü(0UÓümô\KqÙfèµã:b'èÄ.{0Uÿð0  *†H†÷  ‚)ñX]fÉMXm¼ñ°í΋vFìD“Îr:DË;ÑïÊh,’ù{6 NÄûÄþV…¾]Áж¬ÁiaÞVïÒ誻ÍÎÌmáê KíÉÍÕˆÁW“µ¤Þ ÞèÐqÂv¬„Ý´‘Ißâ–b^Dxj~¦2èê,FEžÎß³ù:!Ý„ù÷Ý}@*'®—¥†)Gó#:t0gä–‚ÅW$n¤Ì1·–Ì•4Ó23â„Çu¯a ²ª³ÕÌ*UŽ¥E`—Å2ÍEÄ͸ð轿²ÙÁé1`ç%ßN…v£˜­¶!½~o±u˜Œ$q'dh€MOÂ!4Ù(WÛ^certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/ValidrequireExplicitPolicyTest4EE.crt000066400000000000000000000016561274666402600321720ustar00rootroot000000000000000‚ª0‚’ 0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy0 subsubsubCA0 100101083000Z 301231083000Z0i1 0 UUS10U Test Certificates 20111907U0Valid requireExplicitPolicy EE Certificate Test40‚"0  *†H†÷ ‚0‚ ‚ÞÜC,<¹œãöÅCý,e Ow±$k^NÈ f³© ;Ï©©Ï™ ßúÆ=o­[Š#WtçÆlú]æwx}â“ísÊQ&¬«ØëÜø—#Güú!· Zþ…=Ó°4Ú&¾ãæÙÓØV"©D8•àÐä;+-$kü­8R"é¨Y(Þ¿N‚ý9:~J?˜à02Æ_ vd€šsšŽ2x:è 8R.§LÈp­¯<;bîò•^®@*ŸP£Ô¶Å—穬:õ|íŸ?Ü­þ~Ј:)ÀS'‡.$ê~N¡U[o†ô Öò§i°¹™©Kcþ’Nå#ßI±£k0i0U#0€µÛÖÈ /ZAÇx£D‰ÚÎ.kº0UÒ(ž‰+€oôÈ›ÄÅâ«Ó 0Uÿð0U 00  `†He00  *†H†÷  ‚“C®¿$¹{מ¾Õ ²0.—Ïü6ŸûÊ3ȼµ îð¥ÿn9ˆ¨´¾½@ ½¼ì²bò®I¸¿ó=Xì h+ΰ7™h½ z·‚ÿÍf íU±áõ[AT+ªÇ²ª.1êZŸë—ïˆn+m^X\.x©‹€ï`ÉÐ;¥suô³©Pè´˜ý07àêb4á‰R.ìX[DÍÅ먛#¶ƒb‚ÚWyRÒ{}»ídäSƒí.Ò(‹²õn7¥XS¼ÎÚ¶ÛÔ¶É6½t•r›nÊÉSï—T©^ͪ¹&jtŸt"”ÜS»•Èkx‹j# uJÙËcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/WrongCRLCACert.crt000066400000000000000000000016051274666402600261670ustar00rootroot000000000000000‚0‚i  0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0E1 0 UUS10U Test Certificates 201110U Wrong CRL CA0‚"0  *†H†÷ ‚0‚ ‚·Òv¥>}öÞ!B‡ó-xÔ{‚ÂÕt¤UÛA`<—‹¥£mý_´ßóŽ’W‡y·+½Nök¢ä+ºŽ­eµñµŽŠ•‰žZÿK‰ô%²!‡n„Àƒþ.É"ƒ µo÷lÞø÷ï/]‚»oÈdâá{Ë¢è ñíUi<ÒèÏL%šé˜f¿ÉTwYR³-dœ¨®`¨À×ÍÀ˜J4qÆt¹©îó–dF}_FÕä¯ÚÁÈÔz· \I¦wÉ_5 9¤ §¾4“jÐÔ#8y Bo¨¸È7=Κä-“$¨¹û¿V²H‘”Îò0ÖÊv[ég‘>ФX–ª-ùTÖíûÖÀ£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U %Fà‰zQJ¯5¯ÍÄr·¨0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚7HŒ’ß<-Öýâé°Äm Ö0šÓdŽ“´SC ·W—NÍ9}*ò¯xtbe;]\7?‚a½Øb·>/Á¦!WÂÌÜ ÆáúNR§ãó:¼Miï«n\2 5p§%{E¿Š»à‚ïZß–§‘öJÞç$úxéõI1™¡î„:ÙwG|ðšp¶©èéd÷A€O S(’…Ú'Ì]j…­Žó„4P¯Ë˜:––,B…šL “„±Ô. Û`(ª©~Êç¡üo‡SšúÁò ü Ìh·mÌ@Íä¢(çtá`Ì1Œ…2_ÀD=èÕËøšmº‡Ã2–;2âxÆÃcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/anyPolicyCACert.crt000066400000000000000000000016171274666402600265040ustar00rootroot000000000000000‚‹0‚s &0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0E1 0 UUS10U Test Certificates 201110U anyPolicy CA0‚"0  *†H†÷ ‚0‚ ‚¾è'ÝO4ÍÀ¼ñ^>)³, ç¿àQÁ«©§Á›ùáyuËVÓ­|Ô¨N V¢ŽnŠÆÉÅ1Ï9Y”A£á£ô–3b{¯¸N8¿‰&3Á˜B>LWŒ×4…È¢Vœi?Z^7ç< f‹HûÝY1¡âFê|ï(ÛƒÜ i{CMnz›C9©o›Â«ü::.û"ÔÑÕNC“i‡Üt?8v zvŠá>ÿœYqÙŒP¯œÍ{w8C'«7«)#™ñEqv6-&ƒž «J©¼ÞUËëãÍüÔëwëÜڳ巟$ÒãmN”B ð[T”D7WoÉ v[ Á{£…0‚0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U»ÉÞÈ•çB⢎®\«$`~…0Uÿ0Uÿ0ÿ0 U$0€0U  00U 0  *†H†÷  ‚=u ðNv¥ŒÌ9ù€\Æ,üxÎÿRdùìÙVÝãl6ú3%f¿Ø±|”£ÃnÜù©³½›ó}É‹®{‡­Ô£¹Ý£•UœþîìÏ üÏóÛ¾Â04Q‰Jjï€TÑyÕäXMéŽâÈþ[芸¾€nK«Ÿ]ÑѱS¡€£LS;›8{»áÌ¡Â@±äM°õƒñË[Fží¡_ =ô>‘ORG æ×VÿÊœz6ìÑú^¨•´ìð¯ÑÂK¡ãè³5Ð&Žò:ÁrÙûúŠÝ3sÒóK.WMjë°f[c:ªSv oˆ.ÌÀ°ÿw{ã°õÞЫ£i¶–ßÁ›üàcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/basicConstraintsCriticalcAFalseCACert.crt000066400000000000000000000016331274666402600327360ustar00rootroot000000000000000‚—0‚ 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%basicConstraints Critical cA False CA0‚"0  *†H†÷ ‚0‚ ‚ÊÑ;—îU2q° Åög)È>G«ëYÒLö0ÖX`°É¶–-H¨ºˆ®Fé;½w„„Å-¦no¥jb9Æ‚–kx¿œc«óŽ-Ù1½eNÙþ©ý@ŠïÙ–Z·ÐÌyžåöÉ[Ú §ÆšÄI¬MeÙ¼ðæ‚M!7÷‡ôdMlâ?ܼ45â'ç¡Ò±O…Ÿ–gÛe¤á¹ Å›i 8:ðQ¶ ºÜ;]ï8Þâ<¤/E§œ’Áó´Þ å[ÆÃ:ò:ôßüÉ’ƒ’, à± qr}`fÝÊS«“@¿±w‘ ‹9öÙ?uíØ¤×bƒ‘`À¿‘'þ­òšäg£y0w0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UpßD/™sò6<4Ð Ñòí0Uÿ0U 00  `†He00 Uÿ00  *†H†÷  ‚Kçn nqPPööî¿ÈÔS©õ üh5Ÿ5î$ñxÁéªú«þÖ]o÷PדöT¸ÇÈ[Çí¼']fv•†‘#(q³†]ã¨P9,ºé cmjWã½÷—dÚ³^ÿØ‘þ«Ø­› †½¨R}@´w±¥>¥Ÿx&µcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/basicConstraintsNotCriticalCACert.crt000066400000000000000000000016261274666402600322020ustar00rootroot000000000000000‚’0‚z 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0Y1 0 UUS10U Test Certificates 20111)0'U basicConstraints Not Critical CA0‚"0  *†H†÷ ‚0‚ ‚®Ä'òz¥É¿\°®swŒÆœOéS”ºO=sH~ñSHl ‰“kžø€ò„×RjáÝѳˆT5[ûÑOFo0÷c„‰í$\­‡q:[` w椺ôÂgMìÄ×um_T))ê¤ûbëÓ‘˜W`´g¾ ¾›f•éD™x Oe°òWŠZa‰¯Ed…þ°fKd¨1˜UøãUÅ€ÒMî…ÞA=!òTVÊÝ̵Êom8m"=™} Yƒe•¸¾™S Ú &W^ž^c#[6 ŒÜ^¹öxûyÑn‹ªyJV¿òŽ5!Õ¿1ò·Â/·/Õ§ßM²üˆ££y0w0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U ¤¹0C¬CÈ4ÏïUè¿pŸF¯0Uÿ0U 00  `†He00 U0ÿ0  *†H†÷  ‚R¦i>æYç$)‰ ;àVøÍ>§?g;V¸á†±á$÷¼ßn’pŒ+ïc´Ò FÞIDøNUA1ŒäNÇ>á÷†Þ  K ô ÐãYäx¸9ò°v9º«RšôòѦe3›RŽF‘÷·/¼àL^LMZÏâývÉæüé¾xSA©Û*}OÿH*/¯½Î–f¡Ak«µ-÷Ù¹\ØWž.&–cŸ¢‹ŸÙŠ%7©ô¢‰ŠYŸ5T-“jd—ÌÕE¦1Û!çÿ“†E…@xúÒªÐ9}¡å`w2ñð«Òé%Âô$ŠÔ¸kÈ!s¥ê£ˆ?ŠVcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/basicConstraintsNotCriticalcAFalseCACert.crt000066400000000000000000000016341274666402600334200ustar00rootroot000000000000000‚˜0‚€ 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0b1 0 UUS10U Test Certificates 20111200U)basicConstraints Not Critical cA False CA0‚"0  *†H†÷ ‚0‚ ‚ŸA0¨{:§R§ÐÈT=+6L.€ £ucσ.tËHó¹Hg`B!Š×Úp£–ÍX?žì»ü¢ÈÆߦèËp9[~ÙT¦²áÐä_TdŠ]û_ à¢Xº¥˜&ß8<ŒÔ  yh‚P¼Ž*¿Ä%Dˆ-¶žEÉ ; …NLbôíúè°ª]Ñè~ìݵY&ó.Ü× Ö‚ú… Ô¾1€"Ï"çM³X/Í[î¡"l-‹æ]€¡âµjÐôÓ›æõ¾Ò@|‡ÈZè7v½¿ÛæÐ«¢éŠm¨¸¬Cx™þÍÎDfpd;Y\D<ÓÂ]t†èLè¸$9 o£v0t0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U9Л·O)7¾Ó°ŠvêjžÍïF¾X0Uÿ0U 00  `†He00 U00  *†H†÷  ‚u¹?˜*ƒrk¨Æ98*€MMcæGÇ—zšÝgò8œXE:¥ƒwó~܇äý éx­)AbõÜÔáêxô­©“•æ‹“Ä#ù£±Þ]3ô¨Ó¿TÓâ½³Ý1ϰ¢RbàY"‡GžFí§¶¬¼»ä‰0~îHâ¹بÀ'ÎSøUØx³†@»TYÿ–Ç‚)ðô®ŒYgµ¼)U‹ ,Zðæ°gfì¨4‡%KGöâxºÐ˜¬€–,\SvŸ[±‰fd_z %ÿ”ÉË^I¾¯Ç*væÐÙNbâ~±j,c±/ûˆ^0ÉÞÔHŒfâÐ%É`#ácertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/deltaCRLCA1Cert.crt000066400000000000000000000016051274666402600262450ustar00rootroot000000000000000‚0‚i [0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0E1 0 UUS10U Test Certificates 201110U deltaCRL CA10‚"0  *†H†÷ ‚0‚ ‚ÍC+G‘Cm #[mq#mª¦á~‚wc­ˆ–^ßm\‰\ßäÄG¼›ž]£XK§v«ˆÂØç0¥Õâ;Êp¾Víiº2îyñÛÆlä'ÒØAlÜ8¦˜ßÌá=†¿ÒŽÃ¡Š)hI‚¥¯ßÊ§Ô e©³„ºÛò¹D®³@s¶Î*Ʋž`«Ñ|˜š'뵌Ò"i ô®‰i4_cˆ%D\¨u—CÕëuä€ÕÅË*X™ àr~]íï^²!À§ž)œiZÉ»¯F+‘æ?0ïŠó¢H „g.á:ÔµÐo×<~F Šœ(w8|œæ¤ò…‰£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uw#åv„È”?‚Ðêt±à¤/30Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ŽIj˜/ªy ð|Δ?¢]ñš.KH6z˜Fì…ÿ¾Ô{Á‚sï7˜´TUã›-\Ô€µˆÞ“å1LPÅgȃ©?#þ0ÁT‡} Yi{l¡&íÞ"\Q›Vr¾pƒsîÐ`Ì&ð£RÕ¸“b ¨š@µ·² 2¾?HqyY3þÏâ¡Â/Vs¸x0þÓO¿ h£Š(Þ¼u¹µ ò@ÿÈÏJ™i_¶D“E”žƒüÿÜ-õÚ:ÆÚºÈGèðö» øû˳̥G©hW Þ3uGÆ;>þzã ‚rT™ñÊôôØç¿»Jdâ·ß0certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/deltaCRLCA2Cert.crt000066400000000000000000000016051274666402600262460ustar00rootroot000000000000000‚0‚i \0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0E1 0 UUS10U Test Certificates 201110U deltaCRL CA20‚"0  *†H†÷ ‚0‚ ‚ù†{*Šœ s9v=骫>pB³f×vÃj9amÂCôà~‹ÝhX¯1¼Hø€ž>×®WE¨‹P˜|Îê¨ËËqE7lrO&T{>!5µtz†Wµ€£S¾¾¬´•Ê··Èf ÎïyÀÍÓ%Qú%þt†Ì­¼ß bøl·üèäéØGq@jrß6Ïó:xf9`Yõz-]€Ìô7wXó€-ÛL¢¨ãôr~¢€åœ0‰Š3f—ò0½ey£)ìžúóWgiDf€9“ÆÖÐæv5rèìÆÀ¤¿j_{[@è‹Ê8q|¦ðp΀¿£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U|Øö¾LÎÏ·?¡»3«µ×ûÄ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ž‹}ïò¤ÞËZ+—­t÷!ÐTëÅL˜ ·Ú 6 ¿p‡~6A¦3ó¤•9DWi·¹šªLÛ•¸É·ÓMh©kî óÂ8CšÐß…L ùNé®A3ô¸$¶e˜¨6ÊÁ4£ùÿæ;W¸*îúá)ÁN^¬òJ†—_líõ‚óQú}~?@Ôg:Æ£iÓR-¼•Œé¢Ã?Üò´­Ò‡5¡}3›»«U»uš¦0ÌÐ éeä¹ zšÑ$ ãJð ä™Ñì⇚­–~é:G^ÂóÚLƒ«ñ‡ñº1HÑ‹¼ªµC½°Îòøjt ¼VÑ ¸ÝÒÌ2îÆAôŒ ¦Æ‡m}ºPÌIì”Fäzf Ãw温!l³ß©]¶]ªˆEàŽe(ªK¦¥Y2cy4›*û‹|!SzÙb»´ê1 ‹x„®hx‰³–£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uô8v%«¤ãÀÈuŒkc#¶Š0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚)ç}¤·ƒ—å¶z½lbéôé@ÍÄõDvõÕá<£ï¸J{3 _Ð֤߰ëM'?äv>½ÄWç! œ‰ø±®¾ÙB¿†=ð0¿k©Ò}‘*,Ú'Ä4”lú2¬1´Q¦`òí]NéÝ£êÀÊ[ŠÇj^%—Ü{9]†"¿é/jŸþr:3@ÒH/¡!Ô¾nföƧ—~¡úþ„óÀœ12ƒº–¯¦ûê´銺²©åh SŠt70ò¨)7D …. ÅrÅäŽbÝËSd—j¸öézhÿ¡a„»³¢u¯¨Í¹1•édtš2^jtðocertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/distributionPoint1CACert.crt000066400000000000000000000016161274666402600303460ustar00rootroot000000000000000‚Š0‚r J0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110U distributionPoint1 CA0‚"0  *†H†÷ ‚0‚ ‚Á c)Ðë¡>&5Äìžii_äHÙ !+kˆÓÛ÷ç´áˆú ‚ òþz훲d_ò ù¤`,M‚Ö¹#Ñ–;­¶Ôj ¨Úë`ÜsUÚ(YUäûn·£°Îz‰$÷½8jÉœûíFf=ô†8ÎaÁARƒK[—÷äñEf|;8.ƒ‹¿É@„þOé×åBíBœ ×¥¤C*o]ðïÕjëi¦L.ü•SxL¨ÙÈo·_ý¶,èþÙ … ªúªUÞ:¾6Rô±-æšôj±“yèŠeèœØ—iŠ CvÈgû=4¢8þÚù>oºM_¦¼¾ „ÚêzÞ­£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U0s½p(‚ÒoÏÒ7íÍë#‘Ûï0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ªñ6‡ ÇèF«y'2˜í®î“q»zê‡8ÓÙŃ|Ö l§oA¥e9¬©ø&]QVlªÍ‚Š+ýÿíÚ5¦ ½Z‘%úäBxùþr¤ äŒEPB4iÿgYú²ìŽÖâ=O–ꆷ ZeªóØ„µ8é•ä_–®º¤|•ü–qŠÝ²Íñ£ÝÕkÃôÿÖ{ôjïÝn8Í´¦J/ì‚´•HçRÒõö«‘~ñ"ïÉÏ4gÆDãíý7üiûíž&ìuŒyfëÑJϨ¶æ~€® ;ž­-ƒ½UeÕSºC ÓúÒf›K`bá´57Ø Áýi®Ê3ñUèfµ` þ?5certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/distributionPoint2CACert.crt000066400000000000000000000016161274666402600303470ustar00rootroot000000000000000‚Š0‚r K0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA0‚"0  *†H†÷ ‚0‚ ‚´6,è ?)çùìÜ|õåçFT! .b‡(6ñ7^fýý )ˆ Û•Þ·]—äG4~°ò¬r¼¤q;ECfîñ•&y5¬¨<›6yoz)2lj×òíRÍÒzâ38ÛÖA¬:a¢Ò¶™+³ýU˜K@\*zjb'dõý_¯,N™õJ–Ô‹ÊÔzLJ“ íxå‚ìÓ…ãÊr=„û’©›©(¢ ìâº'mÂóĈ:Ò¶·õ/ÄExCv«ÑPæö¦ÌЂ{³ £ÏïaEÃä©IˆaÖFϧ¶:1éf€øÒcJbÁ9ï~†üÊâ×á™HÑ{£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UDlîÛoëNIxþÍå ì»`k0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚R6}—ëíuŽ;ŠTEóðÞA§kÃX’ ©H€"Ïýü:„,_’75fùU2ôÅ ÷àh¿¡¿ìübïÚ™‘!Äœ,"bN]@<ÊG°ëB& &óÁ+çÉjf‡U©˜TÃWVcߦ'­I0{í#ýÀÄÁ~¤½ƒ}ôÞÝìþ<îÛÊß¿ÐQxB â~7TSϹÒÙUÒ2Rt€e¾QÖ–3Ș*óZÅg!£A²NU3‡oZA@28qÔ蟑0‰ÔŒTT²‘öçf\|éð¯öSŠÜQ¾ kÖó”Ý£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U%ø¯ü¯¶©yKÛËd,‹K±Í0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚µ–/Àû¹y@.5eçXÉpCrÖ%YK+Ôºá#r€Ð@_‡ï0E±úfŽ¡„AÄ4E91}tôz€Ñxöã:y»#Ó ôeNÆ WضC[,Ä_Ó;Œc¢çbäÚóÒ\€ì_­Š›†‘í£åKùv²SÌn ï Šæˆ mut|øCòL¤H¦¼‘À{~÷Œ!MöÅãŽñS©7»=HVõyL”r` ‚·@2))N]ñ±då\ø$< ½´û®©®û XüM‡ö! YB«C"¨ÞUyQ}u~:NØI¯Oæwh¢CnëRç„ÅÂNuðU”}>Öž2O ªPnI8¿EîŒÐrcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/indirectCRLCA2Cert.crt000066400000000000000000000016101274666402600267520ustar00rootroot000000000000000‚„0‚l U0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0H1 0 UUS10U Test Certificates 201110UindirectCRL CA20‚"0  *†H†÷ ‚0‚ ‚¶ÆúùJ>Íjò¬„È… g˜òoʹED¢4ˆ¯rµÑìª2F¾—Q²H?ïòæHõV/$šßF«¹PÌ®ÙÕ˜ˆ2¸¡ÿó ½½ý#D¤NpË£uí7 ÷ÿ8VüÐà_õ€¬|dǨ†Á¢€{êmeë"R@7ð(…]Ê`ŸŒŽ£Š[x©åÂ5+ÏdhUoÇ<=P‡›ñÀꛜ  ÐKkæ¸_NÀ÷‹¤®¶xŽjî_ܰ­Gžö2¹]EÔ5?#eZ‰žIûÇÄßEÔ³~¢\u‘ñ‰¦ƒÒ°À¾ýYϪ„ ÀÐ$jé‹_¡»7ýæœ3A£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uˆ#á³³òlþ1©¾‹aª;’‡¤£0U 00  `†He00Uÿ0ÿ0Uÿ0  *†H†÷  ‚9wm=zhD+¸‘_S`*‰mb®‡½þ"D~±ã‚íkÆ5‘»_Çë ž£¤óÚ÷Õ¬U;F— #tv Í·Ê‹­?3E”…\¨ *)1¢b I|Ò#¯.T‚¹|¥%Œcˆ[A¿šî ëünÌS—6‰#Ü@=uèV:µÒrÏ›LD'š ½zÂ…·¤ ”=oÙа?®U3±µF*•P'”»[…&ž>­óÔ:&êp€Ù¬GºæËD_äfHöÀ¹„s#Êé95 CV$³˜®+ _ÖZìõ4jõ±Àü®ÍoK#4;çL±|#,6c°œÈ›Äç)0Þ‰ .certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/indirectCRLCA3Cert.crt000066400000000000000000000016101274666402600267530ustar00rootroot000000000000000‚„0‚l V0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0H1 0 UUS10U Test Certificates 201110U indirectCRL CA30‚"0  *†H†÷ ‚0‚ ‚Ø+yN(Ë;{q'ì;žæV˧O¦† ·ð«hsoAgs¼7%Ïy3}‚$Y/ìHѧÿ•Rk×í¦$ ‡Ö×BÐ*Z«lå: DUY[Ég­ìQñ :Kàæ°Àóþñôì=þ‚Ï`¬)“cqg!;ýXIAÒ£¶¿ 4®ZY½íKxÙNІòûè[ÛË?ï럈‡N<ØAèô9;,»HR´ÝÀ¶²«¶zºYøt®d=ð–RàlºЗíõöô‚›·qÇ|„ó¬njY†Ï.äo:à5eö¿ç.Û…eKR4ç‹èŽœØ—g¦4—éБ‰¤éÕ£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UH“T}Äm0ÿ-WEq$ßLŸJ-0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ÿkP¹òë>uZ [sÒNFÔªT×]6vø¡*‡ý ó®ì^[„Å‚Ï|¬å*ñÚÓõwES&ç d2C?ë $–ÔѨ¶’FÏôAÌ»¡©ª×jÐd²ß¯½åêþ?årÐÑô°s¶»‡‰£éeáôLm¢Æÿ›È ¬ÏiQž€1Áíy™ôœn\Ë`È‚óÌïq¦ôË1Ô~ÌõK–óx#>ëéïöîºuJƒ îúx¨Û}s b¦dóƒ» uxik‰6»¹Ž9ÛN‘lÆTV¾¿Zð²ÝFýÖ¢áÞ-sçe“W¢w¦ÏÅ Å?lcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/indirectCRLCA3cRLIssuerCert.crt000066400000000000000000000017621274666402600305570ustar00rootroot000000000000000‚î0‚Ö 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA30 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer0‚"0  *†H†÷ ‚0‚ ‚Äæ×䥱fÀæÚ:ét~@ ôÚY‘JÒa–nîB{XòFÆÆ{6+÷88ÐÏÙ¯#( Û°×¼fêð+Ò+ÂaÝ&=Æqg~6Ä.ñ»»lì¬9qöû<§Ò¾ò"Óa')ôX:©u^¡"§5F§ð¢ÍÝO¨‚½\ÚÎâ nhÏÊš¬8?kòÛ2û¹Kúš‚TAï «ÐL¢ J­áƒ¶ðpbõˆÎslÌûås4dÆÔxþÐ^2Ày6ÁpÞwÒ5„ä³ÕÔÚ]ú¤¹º'óÿù¡Òéó‰Ów¡qÆ,ˆq8MÎNVìÎA(NÂÉz[UPó£Ø0Õ0U#0€H“T}Äm0ÿ-WEq$ßLŸJ-0U‘Ñ9˜ÉïOTeŠR-| lw0U 00  `†He00Uÿ0jUc0a0_ ] [¤Y0W1 0 UUS10U Test Certificates 201110U indirectCRL CA31 0 UCRL10  *†H†÷  ‚>ã?*/øƒI†¨®Ý¬‹açý°Åyêp¼=±;1ÄIà½rÍõ¡»Á= Ñ‘ñw`ôhl00*R<"Ú?EG,†¿ðxJa©;›ÿ³Ó°ÔÃbq Æ~{œ¢†=Œo‹#Ä€J|‰ÉA*–&/Éðƒ¡$y{iÙH:œZv¯ªgAA‰MÂÿ =O—Æ!£?‘©²×Y¹p$ær³…,«É½4§‘¢Fg†8ë»4@×3K/¶yŒ—B²BÑè§2x¯ÏjÐzÓ¥(«&Ë ãß64þS“á¡öb„_8tO Så ³ûJÀâ'jÒÖÍ*4ŽÏ;2‚ O o'TÌ5ßRnè3¡{ÎÈÖ *áÈïž"^Ò€f‰’HïG77ÒÈDÎ,CB’¢W»õV8†ª8+ˆ–XDÚÔÞ+ˆEÚ&Б2Å=“k l•2O¾cm=3-Ίp«šÂ¤"Q4ž'ZHw“dÇw#ˆ•ï©£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U Z2ê” ¨ª/Éã.A‚è·0U 00  `†He00Uÿ0ÿ0Uÿ0  *†H†÷  ‚¦àoûïÍ¡!UzÅâ)%bì!7uΆ%‰{U‚þxá.=2#{å!»¨˜@œáeÐñm\Ùã¨&вaîù‹kb »V~b«ÈÆOJWɉh½m‹Ñ…ñÎë+¦u¢õ¸ç Zw|=Çe¦Ÿ'ûÜ< /ÐMFKúl¶K3ÏŽ„í-´F›öd‡<³«zǺͷjO\ 6 U»°Hc)` gÛM]‚Éžj×m8²-¡í¨­M`KžŠžTWÊ3˜ƒYPÕÿ©Xq½’øæ„$3·>ßAR’Ãÿ¥gøÊ©.„éU?]—éõ±g6†£Vã`>ìy _certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/indirectCRLCA4cRLIssuerCert.crt000066400000000000000000000021701274666402600305520ustar00rootroot000000000000000‚t0‚\ 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA40 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA4 cRLIssuer0‚"0  *†H†÷ ‚0‚ ‚½Åã®´™žûÎI8lÜ4•~± ­*âý„GA¯¡añ]7xüÀ¡[¾‹›IEŸ^?¦©{KE;ÛÆEÓ±(+.\ùqw‚dÉÝHbÐ|°æÂ¦%6çï;Û<ž\ž™ ½<š*â»ñ§šf`NV€w},N"I7Ÿ»÷²Æ“ãZÌÊ®N'8µ'oñKH>ûÖZÙ<ñªŸôeXQ‡ÌüÅ£‚]0‚Y0U#0€ Z2ê” ¨ª/Éã.A‚è·0Uóëm¹Å ¤ÚEÿ¯zG¯À¹0U 00  `†He00Uÿ0íUå0â0ß „ ¤0}1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA4 cRLIssuer1)0'U indirect CRL for indirectCRL CA4¢V¤T0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA4 cRLIssuer0  *†H†÷  ‚žNväö0¡Ð¥JNôÑrnµ’Jk|ÛVË ÷{h¶Ê1ÒGGëØªX1mNK±ýã«1Š !oŸ i°÷Š„ÂÿžúÎi"ê¦5¬¬Ø×FîÖ”Ó0Ø¡F¦´è£-Y;8Ùý÷4(¼=Y©¥r°$Oþ"&(d~‹ßyÇ2®›o—¡5JDCýíàŠ’·Iž^…R•?8Ÿ jTs¼Ÿ$rGW–£yfZ:1j˜ÀóѺh 2àºqÀÍC/=§ó>Ÿ hÑö┚)Ž_|certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/indirectCRLCA5Cert.crt000066400000000000000000000016101274666402600267550ustar00rootroot000000000000000‚„0‚l X0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0H1 0 UUS10U Test Certificates 201110U indirectCRL CA50‚"0  *†H†÷ ‚0‚ ‚Чœ‘Fá¾çŠZÎ.¾þcì߯3áòWÁÞHÑ-‰WtìpiMÒœ¦˜“L3³–’)Z¹û·M]©¿#uÏøfÓTräé¼Ó£8C†8ÙÁyœWËfúië|„ QZl ¥WºIÄ®f¿ïÒ@r…É 8æB‚·1FéT ^eXW‹*0_jyäŠnÉ¿ÇÅ·š‹MÞù"©´––Ô°¶än#N’/lŒ•ÃC¬]’¶L¢ÍN'#ÏÀ>u±Ì,1¨pï®À³MdÏTätËà»þR‘÷?ªÀs²’GK5×ÄqÈ©Ár‰ÎCkÁ¡úV‡_³ë«èVüæyݰºdç»õ` yá“å.pñg¥—ª0(»ØúóÂ<ªì ¤RØŒ‘Ü~EA@°Ýظ۪üÏè }?G2Í•í|q£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÉ £l-wOÞBô ¶Þ*v10Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚XÀ¦N)êᦘŸÏE窖‡1n9¨Ë¹ëE1 êe¬\4TŠ ‡…Ê^ܬ+ò X¸‘Ì¡ÌêGë¨ÖOk)¯ï¦³bSA²‘z“«Ü4%ÊÒÞÏ6§Õ©äöæ:+S%Å¡TÁo؉¤<£ºòy¾KEÿÆhÝ.Enð«ÛÃÌÚóáP슰ez^ UýÏÎ °¥ìEþ>H[¿ÀþÕ[h.ˆ]nÄoŠ­?;ÇüSMjóìÛO›ð :,`æ–î!âŠôЛ‡Ýu4£Ïe†à O™“›††õ¡ã/#„R9&ÚJ¾H="¤*[ûûG,¿1certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy0CACert.crt000066400000000000000000000016541274666402600300740ustar00rootroot000000000000000‚¨0‚ ;0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy0 CA0‚"0  *†H†÷ ‚0‚ ‚Ânј£jÌÕAÖênõÃÔ{}ôVâB¼}ªÕ˜ì ˆ›-ÆÛkN£H4±Ý”;¬rCÔÙ·Õ[ŸXk”^WЫt.íÙ«á,ç_"ðŒAd%ìw`X¿Ñ‹vLÂÿfJò)µMÇ9áò¢&£›ù$óåë!úz­'/>ygþ?2Í[FÇáž —ŽaÈ//dLŸfi(hòTcSšb×aAÏ9£ ó¬Nç²³txY¨²PЉ#@ü“l͈þ8rºüA O ‹£•ái÷Öh/Jt·ÚÛþ/u:µa®&N‘'Yû]Ÿ—Š™ER¦$«ëŒ !X9<›\1ëû£š0—0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U  zjÿj…‚$ÍÃ&…ø¿Š70Uÿ0U 00  `†He00Uÿ0ÿ0 U$0€0 U6ÿ0  *†H†÷  ‚`²ClbÛøZ¦ŠmíÂ>Àñs&Ùöy,Í?édÉ)ñVín¤ß’IîKæÜÝ‚ŸBðÁ%ÈÌÂz ͬ»Õ&*Œ¦ÃÅ yæã/…­¦ìê´b×xUhÜ)Ÿv(t$€˜£Þv»E ÏKC3 48-q(å£ãîKÊóý£XJ~N|ÑÂÕ_ãâ$9ª¹ÏûA ³x¥/`Ñ,Á‚¡©ˆ b ÁÎ61éhn·cûUs} Ühwÿöhš5eZ v<ºyõwÆý“OûŠã6÷¦—³!¬£Ëb¿§¯ÓéºÈÊ¥!kl€ê½ICÊËÁ‚ª=êÎè} (l^C8ŸTcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy1CACert.crt000066400000000000000000000016541274666402600300750ustar00rootroot000000000000000‚¨0‚ <0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy1 CA0‚"0  *†H†÷ ‚0‚ ‚ë0o—\T@ÿ›dWÅœRšè&ø/<ÆP¯ö{úB,ßDQ=ºq 2´_5y€_±PÃúÏ/Œµº—ZwÿÉãï#Ëùš|¶0 oCæåH»Mù¯èóRa±½›&L½(ŠÅ¡M„aÙÒ⬆gÖ)¹]9ªÈUX]võÚÜ‹6ûÿñRMà'’:OBÖôR¤%$Þ¹r IÖJå/$s³”¯°$A—SÐ_#Òz2Ã,q2TH0y  üúÄ“i _8'—øNÉê²ño M‹Û‹…HÎgÉØn˜µX˜;]¬‘²þ bÔšãn.xÇØá¿•ö>èÙA&]O{£š0—0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uئž'—ÃŽÔ!× ¼œí¡{òÓ0Uÿ0U 00  `†He00Uÿ0ÿ0 U$0€0 U6ÿ0  *†H†÷  ‚4^.u{wj”¤û]«.ö]3<{ˆ=t‘ŽKÕÀ×OŽ•‘?ì3áó¢î…ô.ñª—64e4jã¶ R¨üãO²Ú¬¢‹„«õ³tѪPYUf ÚŽ0†Z]Ì.ÙEG‰ Fc)ptq¸N_ s]H£ÔbïÿD èÔ•Œ&$íÇ t7½Y ²‘R9¸*Û|ÉNÆ¡[»>šl[ÃÅA\è®#\éÞ˜ˆ§ì¤I£êHõpáSN7Ó>‘Z‡/©ïOtõʰb0Á¸[ŸA—-&Á]¼HT;¾‡T¸úÐ{ë u¹I.„Eu½÷öxå¸ÈVcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy1SelfIssuedCACert.crt000066400000000000000000000016251274666402600320620ustar00rootroot000000000000000‚‘0‚y 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy1 CA0 100101083000Z 301231083000Z0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy1 CA0‚"0  *†H†÷ ‚0‚ ‚Âí'龆¥öߦ[õ÷:Â3ëR–eÓ.l2gj†œåi&ÜÙ£ §b¼ærÈ·x"Éø19®ÚÂPY呆ÃѤLäë÷- úÿ^"v¥á5’Õu9þ;k&“H$NªÄÓuj’šS£‘õQ‹—&ºåýÈC­óC¨t¿J“¤UÕ­–\=¼Ç&Ìô…Ô-ë"`«áÑYÅ ¦W¨6nÑ`ĈdŽoœYª§‘Ûd‹Kcdk‡¹{?°&4‚àÙ#ÝýOý÷Ñ*áOlÒ ÛYº&'…BNz‘$êÍ!lV£db¤ ×^Ãö qàÁƒ•š†^:‚9Ö )Y£|0z0U#0€ئž'—ÃŽÔ!× ¼œí¡{òÓ0U@©Èï²a4•Dla†©æA®_Æ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚v3lK¯—ë.#:%Ko$¢e¹1ÃûÿM@b*Ðð'óÀFÅ¥õÞÞq}Á§Q)'—$ß C§Ix´ñ,Ñ Ãˆ”Ë~ËXúëÃu€™:ê80c'ïT–€\=Ô¢Ô°›¸Op:ŽC&fHÆÇ'Æp=Uû½úev.š„ÂÑž”FŠzŸƒ{Â/‰™R}§P?C¾ 6PßÃÐtb~$?âd–€þpXaP‘4§K ßv=óªÂ¹q( ø‚ÌŽUÿ¬§®÷’k£/×—¤Cç@ªßHÀ1—¨ CæÀ0Òtý:\¾5u?ÀnÓ¬à…2rÌ1certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt000066400000000000000000000016271274666402600326600ustar00rootroot000000000000000‚“0‚{ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20‚"0  *†H†÷ ‚0‚ ‚’@V‡ëUñìã›—+>€™È ÕžÚÌ_c`è©t½I¦éb—ÅQ¥®ØgDÃÊ NÉR²HÝöÃlù¡…¼ÚN1ýBâü¥Ãƒ MJQË_7Á.°m’Š.6 Á32báœ)£² `¬ƒ“ÍC½Àçid6.êN0ú;ÃÎ2ÚŠœŠŠÎúFcù"ÚØ®7• 8ͬS qV­ª˜ÈS’:†„éé¨RÓÊ„Ü3GI3õebTQ—×”}Πⳋ¿“ÿû%\æÚ´§¯‚¥ŠcIFxô¼ôÚÉ߆µØÛ›øŸLˆ`|w\ãÎZNVÉ–»å&ïS[ê>À7d¸‘cÔ!!SYùÇG½à®ËÌB‹Ó¾}Æug<\¨certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy1subCA1Cert.crt000066400000000000000000000016231274666402600306640ustar00rootroot000000000000000‚0‚w 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy1 CA0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA10‚"0  *†H†÷ ‚0‚ ‚É\e eqÕf“³h٘Ϫ×e )•þBÛãZTªü]Ýb¯#ˆesK&¦tÍ-¾ŽU~xŸò#ž¶)YóÆ(fÕÛ¤×-ŠZ1¯õµòœ#MEÂó–kŸ„!o‚*Cq BÒ…E_CHèàËâHéÜY·¼‹ëQÅA‘›ÌoqIÊ&;0L[³!û#Ÿdj¸1Ëï7„)ä }¹,2ÏZÐÔ¤ôæ®\ôgþÀ\)K>#MÖ³x1pª›Q¢+óÉ|ø ]0@{å|£ ÅyÈæî.ú+{ŸfoíªÄš:Äêuå©m×°ÎDÄša? £v0t0U#0€ئž'—ÃŽÔ!× ¼œí¡{òÓ0Ut ÕXÙ+SÒ+°Í]qÆ¡¿C§È0Uÿ0Uÿ0ÿ0U  00U 0  *†H†÷  ‚gÌÏ»G½ïŠÒŸ«õEÓ Â!¯øôr²Íʼޑ™ R¶:ËÝâšÞÖ]» ¦ íé‘Oߌ{†¬=—î}~zÌ·?NwL˜³Q®5 ™UäÇ@£ÀÅŒñ8ñ.Z¡(?B¾Ò»£å°‘qz‹/ñɶ-°®c(ªwü¢oò¨5#õ¯AñhR½‡{.C”•–äK·"££8fÈk‰fÛŠÿƒ¹’’ÑS­“öà£hX]2_uªaã¸ÅfÿÆ^Ñ$ñ×IJRÇ´¨Þ,äè¿ø‘Ü‹ gÿ訩† DlŸ Â%« !H~mèíß­d{ÔXÞeš93IYÑêBcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy1subCA2Cert.crt000066400000000000000000000016231274666402600306650ustar00rootroot000000000000000‚0‚w 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy1 CA0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20‚"0  *†H†÷ ‚0‚ ‚×™n!?ÊÄèkÑÀW1aˆXTÌñÙòÑá,~bNiÐÝ¥|5÷XS´þ‚j`NÍBË5á´op_Áשo0ðý,ÇÚ½z¥Gé&ÚÛÛ¹su~ñÜ@aÚæ€Ò½mHäNäüÖ7‰ä7ÎÆk³™¼³RÖÛôå¯1U<ÒNŽ[~HøÊ@çºN›¬ÆYÔ°¦Ä0@´]H¨‚¥ÿÒì‘àø5¾Q¯Ðc=î÷C™†ª×}Á] dÓÛ g7i‰µÚIsÑ8sŽ}J÷kÒç/B2m­á;Á ç…é•C“ç5-!kù»Ë˜³2R“Ò>bI5üt£v0t0U#0€@©Èï²a4•Dla†©æA®_Æ0UŒÜß~dÛb¾ÛKQdŒjfØ\££0Uÿ0Uÿ0ÿ0U  00U 0  *†H†÷  ‚Ufã*ë}·-&' ÷ 8¤ûÅX×FòI¾£©k¯øˆ«uY´'E4ÈßA­uí‰ ]­¿¥fù?ÀpW%þKè¦ùöÔnùÄmu¢àlyYO2l²¶]‘˘t¨S´#ݽ? ãÆP½ÊN2iãúΛƒžO?FZXÂ&ºbz.§¼N(æ GGø¢‚™ 8x^1'cUUU‹Ù©<ì…ƒö—®õò 7µRcÒ=«®À¸X_Vi;…™–o‡cñBHSÃR:,ò)›¾FõG¯K×$¤™(j`¤én&­˜åXï™SŒ ÓLÙî]äïLcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy1subCAIAP5Cert.crt000066400000000000000000000016551274666402600312270ustar00rootroot000000000000000‚©0‚‘ 0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy1 CA0 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UinhibitAnyPolicy1 subCAIAP50‚"0  *†H†÷ ‚0‚ ‚»]ÿ·e”†ÝPèAxÛè¶ÝQš½+SIQ•+ðâgZº1I”´&ÿ«1#ü‹Z°ø¸;•XÑ>²7iËÆ»cýY{÷eŽ­ªµÛ”õ71Ï ÒâÇgOöË[nõ£Œ0‰0U#0€ئž'—ÃŽÔ!× ¼œí¡{òÓ0U‰Tt`³÷n aŽû¾R&0Uÿ0U 00  `†He00Uÿ0ÿ0 U6ÿ0  *†H†÷  ‚"Ë.ñlàÀ ö” ïCn:ëÏùYœu»§°Ö®ŽïónƒìQÜu²§H âµã/+¸¶ú‡á©$ÂÉø@¤ˆ¤ä%j[²¾X¿MAóBÿ¦Ø‹øM°X‚1hfvÄ"mê0tG î} úšŸ‹ã¾)5kK 3žž³ÕÌðÏ”ë-逸nu–û§Ü[ÈÍÂsÚŠWÁt¶\–“Ù}ØdSXW®sÏ:O Ò亄ÍÒ×édâäØI7F6Ê:}+‘ ù íwÚdqQÑù>rCÓSÌ–·–Ÿ Y%tÀA˜Ï½q¹/M¤• 5Ïšë0ùÁxYª¶éEjW™^²certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy1subsubCA2Cert.crt000066400000000000000000000016321274666402600313770ustar00rootroot000000000000000‚–0‚~ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA20 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UinhibitAnyPolicy1 subsubCA20‚"0  *†H†÷ ‚0‚ ‚°娽°NÔÃ%Ê‹^ºˆá2…ئPä|ZbÐ@_³Õ‹à»“ NC&®kèuÛuBÊj|çŧõ=w$c†°"qÙoKˆÈ¡ ñd{‘wè´ì¡ ÅC@þŠü«èÈsÉæŠœÂçéYŸ7y(´Ø›Å 3ܧŠÂ¨ýõÚgfä^µØÚpœóÏ»CVü¢¦3Ey3/Ù0ìz¡Û07ש”rc]«·mˆ^]“1½› QˆœøPuEH"ï¥EJ…ÙtFz[RòQåÐjïÌ-ciBtN m*ûû9`Ʊ ñÉî"ž±ú‹‘WþHÉrƒ½}F°s£v0t0U#0€ŒÜß~dÛb¾ÛKQdŒjfØ\££0U}ÀœŠvùI3÷¤KŽ0u•;èˆ0Uÿ0Uÿ0ÿ0U  00U 0  *†H†÷  ‚³­Ï° Añ¬t$OŽÎTâ@\ö$üž°âÄAsº¼Ã 4A$GA@ö ‚ì]þÝ3/æä÷¹4<ÜîJÛ!€“{g*þ+ýªš¶Þ"–ÈßrϬ@<™qvÕ6„g¾þáxUuÎb¯;žò‹R%_tRuäßMÒêðÀwY„{ @ü蓎ø2x£ØœÎј¢‚qŒ·eÕæ°ÉÓöÍYj«ðÙ˜zÅ©ø±a›A4˜îxÆ-Ê”Þcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy5CACert.crt000066400000000000000000000016541274666402600301010ustar00rootroot000000000000000‚¨0‚ =0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy5 CA0‚"0  *†H†÷ ‚0‚ ‚ÝH '¦+î˜X .çM À÷žuí5 ê Qï´ÒÈ¿¶Ð?è¼8™cí³·½býQÅ€Ìkº°fÉeÙ ®_aB*eÞfå™ sÞ  ¿W­œ4®Þ±áæGXݲ€€ –' &ò×4Œ¦»*RÓSÜkÝÓ+¦Z òW׬®<âexÄï£[€>°u$;êÛ åç·hð\öRò<$Àøq4' še(Yuiå¥$™­NCñè:j‹+ 3 ?¥õ†o‡ú=ðËúpß¶­üØG4¿µ»)_æ¡"ÉîísªÑÄqäÄä]Á²,žýÛÞBÕðL·ÈÄ"…— Ç¿ye£š0—0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÀ&çiÖ|ð½ÕªSeùœË 0Uÿ0U 00  `†He00Uÿ0ÿ0 U$0€0 U6ÿ0  *†H†÷  ‚†Îæ08³Ô]pMsq Û8+ ÝúŸƒ:Œ®©;7Ã.Õ@m~òÄ…„&Y`C…ƒƒ× ƒã )±Ñ60çI‘¿œ7ñ'5ŸúëÙü ZS÷{ á[ë)ÚF(£ ²E–ѸÞÂ9P¦›§)øôº–B56F¡ÕŠš¸G qT%Ôöþ÷ä›ñšMùdc¼†‘Í•¯K@%y"K¬$ÖZÆ(ÂÈÍ Òm\Û£Œ0‰0U#0€À&çiÖ|ð½ÕªSeùœË 0Ul™©¶ë¾pI6LXš"舅/Û0Uÿ0U 00  `†He00Uÿ0ÿ0 U6ÿ0  *†H†÷  ‚w†‘ÚélÆ èÕàm-7‘q ž–:iM£íÞjÛä‘%G§“_:(ÉhË=Ü™õùs½ï7å Æ«-úW8ÿç6h‚›öËZPóÜ9Ê‚"ÔØyËi9@ìs9|ƨJìäј c0ÄÌaqéýÒî'O§GHò"A/ž{-äºnôFv/®ÅçÖF ÊU„´LúÐ#“`^“ÀT~†Çäp† Ø'°¶Hj[KÜ“ÍÙ‚¢%lŽæM',¸ÕŒVåv2w8k)iyVqSÀÿSãUãúóŠjð5£‰‡Æ8¸BKg€cŸªÏ5Ä´ÆâBœòLcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicy5subsubCACert.crt000066400000000000000000000016361274666402600313250ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UinhibitAnyPolicy5 subCA0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UinhibitAnyPolicy5 subsubCA0‚"0  *†H†÷ ‚0‚ ‚ÂDeþ!ÒÞ^[ºXãµ^€jöû|¼h}‘§‰›ØûXi<øùS5ó×nm¢üy ‹'ÆYtüÎú˜•)7>»[úžƒádv»«ç-¡—Ÿ/<¬Xz¿T¤E—$*èÝŒ"Çê¨Å&î8¤Bßæ?£}Ýp À#Å`µI!®ÄØùJi/¹’äO€Oür.ƒæìޅų€Ô] 0Ŭ¯íT'3”u RÝf†%DL¸)"Cµ–yø/“gX Ñý&ÀÊ;qé@ô,UÂ%å5/.WEå£|0z0U#0€l™©¶ë¾pI6LXš"舅/Û0U1á?übn€eÍ©y+n‰ZèÃ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚\O±fºÖþ`<+™^?–¨G×7G ׃õ‚((y©XM!+.‡u˜kr˜mú”¨xs­±¦' I¶”ÎÌ8./ÎûU17·¾?ÏO xã!ŠÜŒRE‹7µg¬r$@%×ɬ€qR˜½¦Ó5Ò6ÿ¸"ð§$Y¦‰âSÅ´L< ÙDÄIÙA l‹&2ò²•lMì21jÇÁ{±aõ¿£æÝÀñvt9îËu>Í /”|R…ªƒöÖþ¡î%óºÊu/aÄ# ™íÖ3 …ÄM¾ãÍ Ý±¦ R0ÚéË´Ä»e®€ E¨5^]Ô3'^˜ÊÑ:@ÆX4ìA–certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitAnyPolicyTest3EE.crt000066400000000000000000000016311274666402600301220ustar00rootroot000000000000000‚•0‚} 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA10 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%inhibitAnyPolicy EE Certificate Test30‚"0  *†H†÷ ‚0‚ ‚×\ùã¿ÄQ§ ‘“•Èc‘‰É¸R2¼n_M›`´@ õ𼳉¤;ÿ<$·ß¡KcªŸb`^ÉZé>ôäÃ"Ãä¼ܺ±ÏåL"‰Ú‡_¡Ús4kƒ ,IW%¤Ã+„TÀ6x<7…#é‘¥L9·LÙÛAˆ.iŠ*­5 OÐ0®Žû6½Æoì3y©:…k™Îhœ_x³<Õ Í¬ºÏ7å¥i~»v_æþëŠàïW9Ü€¶›$T©x¹š2LN Êã’E±WhÂÕsÛ(mxò…bAãN”ŠËñOy2ÃÚóŽíÛéÀ¨ý=ÒxbÂÍ=ˆ pm‡£k0i0U#0€t ÕXÙ+SÒ+°Í]qÆ¡¿C§È0U >^m+ í ãOAñcµÝÁ’0Uÿð0U 00  `†He00  *†H†÷  ‚űhÌÄ[âñ,¢Oà:*S!´¾” Ù, )ëoj3 ¹¨¸Mnï—w4a“«›ÿØ­Ï7;[µœÀ~†ää²*~6,ð-²¥¾_ß1$”x1,ЇHLîº%D[«”*ÈMÀÌ)ll¬¥vÒeZB2ªüì‘”œd–™¥+üÿ—Û0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚\Ä“2†èˆ<¶y¨bÿÝF¹ª&Ã謼ò;d»»6dn¯Cñ‚ÿ”qkBÜûj#Ž’ÄF .ã;‡„±–ždêwQïE7¬certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping0subCACert.crt000066400000000000000000000017121274666402600314450ustar00rootroot000000000000000‚Æ0‚® 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitPolicyMapping0 CA0 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping0 subCA0‚"0  *†H†÷ ‚0‚ ‚ìqýò´&–½§›Jð¾µú惱´àt‹jåx>ø–Ò#ß^º ¥¼¿¾¡%½Q™÷òød.Iù •ÃýôNc«E«fvéÉ CºÂ{pb ù ÚÙ\ùÐëÿ^¤khWªöFoò]8äŽÖ‹îOñ'¯'‹ØW wL¡ÖžnÕ+};?¤{á+å-äêq³XñKcg¼¼ògî}` s6ëíÊc¥3‡h nž×ezì­ÍuŠJȔႃ“bJ´ön/G^]ò³qÔ­oÓ…ãUGÉ*¸„ÖJ¼»z0ŠÀÖñ3Æ¢ôXôQüˆsJŒGŸsµ¹wŽ7­£¥0¢0U#0€X7&‘„`¬îö@>¥+üÿ—Û0Uÿ´sbR\–:Z®¼¸²°X`—”)Í%àæ^:c:¬w—T=ÊPÛÕÛÙmͶc‚óÍœ¿Êz\_£¶$Èîä¿îÈbµËÒ ÅÒb“þäpÌYùo$c"¸±­ÿxã©Ç/“4“©,·?Ú™ä¶-Flópú~4­›cjƶߡq#Š­ÿÁÍF˜wcü§Ox°&b•ƒ„ ´büI´^Gjè£7caSq[¶hv’¨…EOÃRíвaC¯}ÛBÊÁcØŽ&MJ}qª$îxZcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P12CACert.crt000066400000000000000000000016711274666402600312230ustar00rootroot000000000000000‚µ0‚ 80  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UinhibitPolicyMapping1 P12 CA0‚"0  *†H†÷ ‚0‚ ‚õ#œñq㢱²Ž p"†¼mñžOZŸŠÄUö¬|.ƒ™8KW0ÎQ>Koµkˆ³°Æ«Ð0F §»w¾°=ø=#7gJ@ßq þ»ò#“-oávͲOtr£EnA$䜯Ñ‹¼–xW?VâZÅÐȇ|T9é“lŒñ‰J‰xJ7\¥¾æãö]ϫ޾TÕlùڈРɽìÏ'Øœ ЛĒ䎃Dߘ¨J£ù‚Ï_áô¼œÏJ°¨å ÉT/½ò)–-d]AzOI!)^»jDj$dºUB+ÔÏÛ¥¡e!?¼!µùÙIéÏò©Þ9TÁOà ³;)o[D( £Ÿ0œ0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UMg~Ý9¯è&Þ4x±uÚ¤0Uÿ0Uÿ0ÿ0U$ÿ0€0%U 00  `†He00  `†He00  *†H†÷  ‚+25˜à›$dtu·Ê+órÿ£Ég5¤³]ç"’"úËaà‡¥Á¨dvž€2µ©ggMïþRy÷¢wMq§Î£n¼g]Îv#üd{ÕÃW¿º…ÝÃeJñ:S¼Gº¼µViÁŽ-÷p/•c/dÚ¿?[kÂr€rFCŠz;%1óöº±x ¦XTáyð1z›¯ö¦üƒI­±’.¥…k…Ù†pžð›ãü¤zb²aþÂI¤<åk.ÌSeIZ¬[iø:˜Ak5)CŽ`STpY»‹øá ‰<|µæ\¸.ˆ‰z¨Ê¦ÛmòŒ’Є‡îs¨U‚˜ÍÝ%Ï«´ŠÄk‰÷žm£Í0Ê0U#0€Mg~Ý9¯è&Þ4x±uÚ¤0Uª&”d~¼]`Wüp•flç0Uÿ0Uÿ0ÿ0%U 00  `†He00  `†He00@U!ÿ6040 `†He0 `†He00 `†He0 `†He00  *†H†÷  ‚i‚íñãù…'BWfOxã×~~1~7èóÓŸï#x€Ô'Ô HŽßò žtVÂß)7Åàlìa(ê…›'wæûRŽêz"·6¢Ï!×!s½8 `ßÌQ¤ØR¤‹Ës¥et!`pŸ×îêódC|ªcÖ‡zÑ ÉbV×À E|㈣Lì”\ÿÑ^úXŒÌ[HÛ¬[H£šIëÁ¤•x ²ÚÚ ®Å5ñJÙä<-{ŠSÁx¯/:æ`Þúl\ ïídá°úq¹Î2/∵“Òìw›Àäª Ž3!¢ä*§ï:®¾˜S~/é ”"™© ·Ò ž¶¿¾!dcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt000066400000000000000000000017151274666402600323670ustar00rootroot000000000000000‚É0‚± 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UinhibitPolicyMapping1 P12 CA0 100101083000Z 301231083000Z0\1 0 UUS10U Test Certificates 20111,0*U#inhibitPolicyMapping1 P12 subCAIPM50‚"0  *†H†÷ ‚0‚ ‚½ƒ®€Ìä‰ÁÔ+>cØ|Yr"ºpƒò]6 R‹*hø „)ÍÅäóýyˆC„VK?{%K2ªQ)k'ÝA4zµ¢/èÐÇrÌ›]Áæ…"x½ñPg%ãï]6Í´ó©Ó囎U ­YiK½FgmŸ.¤þj@sö¥¼ù¬¨T±!E‡Âè: ®%`_â|`dö(< 1qÅ$‹ïòÑH˜ó±µ¤Äõ­[=^¡e°óL„q#?ØQíŒùÈå嬚iCŸÓ/ˆí~Úr[/c£Rwôž‹—NAU‘gõðvj+ò[QKíz,M_Vh8hu“¤pöä ;ßÑ£œ0™0U#0€Mg~Ý9¯è&Þ4x±uÚ¤0UÏv'";Âô‚.îæÝ€{S0Uÿ0Uÿ0ÿ0U$ÿ00%U 00  `†He00  `†He00  *†H†÷  ‚>ÝW¡RÍVS;«4¶Öc>匢ò>;¾+Põ0 *5ÌtKñ%3¹ó“dŒS%ºýª[|M(Ö­ƒ¿Ë¢Á#=°}§-â›zjô N¶B5'RÁ“´ 𨸼è7÷kHå°Ëkbàëˆi«àbàÆ@§@àHSýAÁî!h_A ÄÐf5?ç¸IêìIˆº©©%jí¥Ù§„!®·wSÒÂU^Èöt1b¼âïN^ÞcËú«ècPÆ’•¡ê%Œ›÷H˜ÀÏ Ó|7³<  šÁ퓺ƒèí·¯£ò¯üq ŸÍÿh½ºÚ„àëü¼Ûå]AÐà,G+ ýJàºRûcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P12subsubCACert.crt000066400000000000000000000017461274666402600324520ustar00rootroot000000000000000‚â0‚Ê 0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UinhibitPolicyMapping1 P12 subCA0 100101083000Z 301231083000Z0[1 0 UUS10U Test Certificates 20111+0)U"inhibitPolicyMapping1 P12 subsubCA0‚"0  *†H†÷ ‚0‚ ‚ãTAfÅRfÜ9o]Ç”ÈoÂlè¡¿¼9Ûy™ñïPOïóÿSôH$¤‹SømEu©Îºœ~6ý—úª4ÄuµÙžÑ]@¼wE»x|RLðæ^wö)¡‡®_ò¢7¬E›ô†M;‰N G¢â£ÒõÛLƒ…ýèZ¼ôeT¦D¡MCC2úàÒ¡ª#ÏÚ ýÞ‘óÙê‚5ÿZ2 Ñ.Ý(oqK]4°õ1WOÄ„ ß+B÷¢çIW!Eü~ع 7—·„ÛÐD«.®ý¤1S:%:á«¶ð)q(ØdÄçúòЏ§q9Ú¤m ü °³V#<ú"•lh Fýö®z‡]£³0°0U#0€ª&”d~¼]`Wüp•flç0U×€\‹ŽAvº µsqè£@€tÑ0Uÿ0Uÿ0ÿ0%U 00  `†He00  `†He00&U!ÿ00 `†He0 `†He00  *†H†÷  ‚S&ÏÂåÊøÐ8¦CM:“ê£0}ä°TÇÆT:tÀÙY <>ÕÅsÀ¹f4R˜ÅdåAr¶–øY•G¤ÞÚàD=¬_ÿì`Q&Ðƒé¡»Ž <˜fe~âÔ„ÇOÅï¶@zhá8k!§š;w.R+Âl&o¥Ópý~€˜ ½WP”RvÞ¥û¿·b÷’:_Ãìþ.òÖÂ:€†à]¾óöªœ¹däµ5ÂÌåå ›<—¼4KBrpçT0Q›ÊØæSyKÁ¶œàÕAq¾çÏôŸ+Kë(„Û¬\†i…es#Ÿ FÁ´ã8m‹F‚=޳s¼Es6šÙÑcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt000066400000000000000000000017561274666402600331060ustar00rootroot000000000000000‚ê0‚Ò 0  *†H†÷  0\1 0 UUS10U Test Certificates 20111,0*U#inhibitPolicyMapping1 P12 subCAIPM50 100101083000Z 301231083000Z0_1 0 UUS10U Test Certificates 20111/0-U&inhibitPolicyMapping1 P12 subsubCAIPM50‚"0  *†H†÷ ‚0‚ ‚ÌbvǼ«}麋$*aÄü„ú`þÜ0öˆµâñ5ÿø}¸èr'žó.8%¾<þÂë#âOéóÔy1h£"ÇÔ{=ör‡Ld|Aܦog0»Œjg.-ìÉ;¾É¥œæc½–Ý—CÇüìØòd{Ë‚te/‡'FGª´Éw}5ÅHÛƒn(¸(Ñvᵿ±pFQ¿¯#•f:ݤŒ—m€û¦?sZÇ>5ù£Ü¤EmW– ½k„s:^o³`¦[´­f¸8Eº¥Ú„v„”ùœ›¬N£¶~—A-¾¼'ác~&Z¥æOúú¼bóTÁI£³0°0U#0€Ïv'";Âô‚.îæÝ€{S0U‡5g𼡠6º¨)í›[p0Uÿ0Uÿ0ÿ0%U 00  `†He00  `†He00&U!ÿ00 `†He0 `†He00  *†H†÷  ‚$Ko Lž„5¢(›èŒ>¹éÖÅÝY$¼X¨½‰=Gnâºê×çǯ’–æèJ;‘¾Ò Ðfö³`Ð1`è /ðõC³¹¨0>˜Øk0nøõ„êË”à&éò6|o•³ÊY4fÐm;­T®gyî6þ½Ó°û7˜©tVµÌŽ¿¯9E=×Tà}1vÎE(c¥Ãê ?d®’f¡ ËÐmpæ!Á:mÄ´Š0Š?ši¢»Lñ†ðIL¥¡Äiz:,©ªà Jflìãòœ6µÂBà¯&üú8Z4LJ¨K9™‹¼hÒSxØëºEBøçxŠÈÃy =Egÿcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P1CACert.crt000066400000000000000000000016521274666402600311400ustar00rootroot000000000000000‚¦0‚Ž :0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping1 P1 CA0‚"0  *†H†÷ ‚0‚ ‚Ósr•\[·<Þ•ywì·åè%þ|Úl\°Š€ÉrP„ªQŠ:áC_YAY§-,ô·@(›O;Í›¶Ä°ŒOí¶sŒr%y+4ÿ8 µÄj=%ã:í%eî/2ò.ÎfÉœŒÀ¨œœ–îN tnäüÅ3•ƒçKv_ó}”ƒÚ% j~GPáÙë™»¢.GK5ܼçÍ€Ço¢«žjæPÅŒ¸Tä*ËÁë:É^G7~äzOïh¶í›tc î§Ÿäš6Ç1–j«ü›ÁFg)'kÛ7½QLðÒÔa†LÊ‹ºšª*Û¼sSÂ˵ÿ$!¨ù ¼dÔÜᣑ0Ž0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U¾¶½)¡Ù‹á¤€hƒ(­Jð0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚‰[f}\ÀŠ + /Kd¬[|\ÙÈ• “Ô(ù*Ò]y4gïøb0¬mÍá]¯abE´Í[~»ýùTR ûqwn´Ÿ˜3fêé—íÁ~€u«’˰–“+“ùzЀß$ßA&®–9ë±7 {Ôêb›r±Æ±]{Ðþ |˜¨HcsÄD+™oe˜Í¶ñ̉{´7‚ŸE LÞ Ù—ÂE˸\Àlšï,OªÍ/E88å:dUÙ A8cäÛÍ=ŒæŸTN~o=ŠÍrcAwhÀMê‡[.@ baš)$ CÐ/„‡0߸lcØ‘[™¤Tgé ·—½-ø‘ócertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt000066400000000000000000000016431274666402600331270ustar00rootroot000000000000000‚Ÿ0‚‡ 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping1 P1 CA0 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping1 P1 CA0‚"0  *†H†÷ ‚0‚ ‚¾!ºÅŠÆœO&¨¼¸«2¤×©L-Ü}3fx6TZF_1–·tê¢ C¯[¥ˆ“àW†eåIÐrAdÂLM-3Fö™±4Š›ÌÓw4\?Œ¢×Hûw†`x{†ÿ1 (‚°ìf!A²](òîpMê³¥#=®Y³G áþûž–)pë£zùYìËê¿çÇê#è€þ¢?3ÝÄlÀÑöžî%HÞšLuƒ¶iC/²uÃÉs§0,•r×Ý^½?¬C€ù¥¦Ñó!j¾Ò‘ä·ø÷5ì£Ð™¦•è…dBüyMÃß«VÜUhLÀ¹&ÛÉQôYþ)ë£|0z0U#0€¾¶½)¡Ù‹á¤€hƒ(­Jð0U—ÌB^×øD‹³—Q’Ýl;!Ø0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚(÷¿~8wÁX¯|ÐÕÎGu¹þ¸,Ÿ¶²‡c_ú)dì<)|óá,Üë=wôÁÓ?b<½8}T€ªj }+pÌq'Ë]áê! B•yG?Õjç¯uã“[Öž‘·mÌÐQè-‘VB–Å(E(ÂîEc‘ ùç¹Õ3Ä#öî¨_À„UdÍ•@j)E´:ÏO@R“ÓµþþC gÕ° Ec ×G7]Fh∸yM¾€qÝ®&µn4b#[gDÈŒ{˜Ì½‰(R„Rí7sôërG«²/¸¤uzµ»Ó¯^0é-õל[x~kä=Øý3kµI•m<ùiDaÍ0rcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt000066400000000000000000000017231274666402600336400ustar00rootroot000000000000000‚Ï0‚· 0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA0 100101083000Z 301231083000Z0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA0‚"0  *†H†÷ ‚0‚ ‚«µÎÿãöô«2ÒéùO!±¾dèÖ g ‰2K§a:ªæKéPli6 ^“¤ñ%ñlwˆœŒÁöŽÿÃv·õS‡©í-ÜåÉ¿H¸Ð|å{ý\$dõ•ô,ðÞÙK°0O«§©S1SïË9×{ã>ýu1æ6 Š.3º|j b¤¢Ÿa÷àå@SJ7hY^úlÑà°î/ËÅoç"3VÄ4¦CÈÖÐd%T%Õ[U¬+:LÒ-H¬B×Û$æÅ1< hT¶%ŠôfÁõ!.V/’Ò,Ó¦9.úTïJÕJœÖáJÁrú›[¼ë§ëÙàø¤£¥0¢0U#0€óÍ?ƒ0ÓÇbÚæÊl¥±¶€Ë0UY¹ldêó®–ê¶Q\%;Ïíõ“0Uÿ0Uÿ0ÿ0U 00  `†He00&U!ÿ00 `†He0 `†He00  *†H†÷  ‚L”|„zTKñ&ô’{æ7_8ƒ¥˜ ŽÔ#¨ÈÇÒ¶fþ×ÓRÿq%]/jKýì:èE)æi&¾Ú{ʾ¡Õ™áÑH€)‘óä{¼$¢’ŠGaq2žV3g*¯û«ç*w§ÇiÒm—Ï@3.þ°fê=°`¶÷Füî¸ÁiD mº’4U@™šË|ÛL²ðÒó|ž¬âR?Óg¤»,3›æQvðÏAk{G& –x´+¶[Y°Î«ûm(?xïåÉ?§éð§‹ •"7F5IÀak¬Æ@$k½‹ >R0ÔðŸƒû¶ï QŒ"ï/âIu܈@WñÕŸcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P1subCACert.crt000066400000000000000000000017201274666402600316460ustar00rootroot000000000000000‚Ì0‚´ 0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping1 P1 CA0 100101083000Z 301231083000Z0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA0‚"0  *†H†÷ ‚0‚ ‚í±÷øLÂÆ71g2Ò?ø.ÍP£ úËŒ=ibCÊ¥âw”™—"O•Ÿ¡®Û¹æP9 Cß 0Gutqg–àë¢ÉO•¸~ÕÑ!—¾8Mjèh`—6…SXÞ3ó£uÕSô>b,¶~Ò´g4•h|÷:«ùÚÇ.^na€QÒ®Ýýª‚WJågԾǻv|Yß㺫·¯bP°^ò%ÖÍ@'ìbp_Ïkžsð!q„™ÿ6³»ªƒR{R™ëíé`Bøl»°RkqqœŸO™ +Ã?ˆz/ô¯ù_o1žàG¥9®Eehw’q,_ÙÅuÎõH¿©>{{€±šU-ñ£¥0¢0U#0€—ÌB^×øD‹³—Q’Ýl;!Ø0UóÍ?ƒ0ÓÇbÚæÊl¥±¶€Ë0Uÿ0U 00  `†He00Uÿ0ÿ0&U!ÿ00 `†He0 `†He00  *†H†÷  ‚YŒ´ÉA;‘G•ªÝ4—\矲ä³ý§3þƼ—vª£´c(é£ÙÌ ·Ð{€Ñ%=’º‹}ŸëSïÑÉ'CýÒ ´p’)]Û‡§™ÂˆÊVh—je6ªXö¡$‰€ Ø;lÒÿ·Žžå¡‹õÁC0a¤KêÈÍÿ”&¡ÎHÏò‹”Xå6Ä+À\\Ç[µ+±XüȈÎW\mPô‹ŠÒ¿›qÉŸÒñáØ© ´ïµt*m]ô@µ¯m\3Ã8µ3̼ªMUð ØzþfR'¼ \zyYn=ªgZ™ˆ(‰±Ì‹ ¥e*]ŠxUúDEš't¯ùNÊ'Wš«certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping1P1subsubCACert.crt000066400000000000000000000017261274666402600323660ustar00rootroot000000000000000‚Ò0‚º 0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA0 100101083000Z 301231083000Z0Z1 0 UUS10U Test Certificates 20111*0(U!inhibitPolicyMapping1 P1 subsubCA0‚"0  *†H†÷ ‚0‚ ‚’kCœômõ>¡ïäh“Ò{ˆEÞt8H%ù!§Àèu qƒ&T„˜l‡š,,9¹…%çq‡TÐ3`EùTƒ¤XÈ»Œ`ÒdW›æ(š0dg† Ú`Û;ÚÛ\cÓZšÑ>çÞOàá[Ír—‘¿b•±oÏlÕ(Ÿµi1 (—}ŒRNÃsäÔÊU¯¥…ú üš®›u•N©¤è`àRµÿDò6l°u¤³5X—ž)ǸÕõ€c”*+ÀâäÏÓædõ)•Ça“ͺ\òŒÄkÂã~˜åšÆ²é±&Ë¿îF†T÷ nL1õ¾ÖäëyÇg=º¹ýZ{£¥0¢0U#0€óÍ?ƒ0ÓÇbÚæÊl¥±¶€Ë0U>Et¢‹ÒñVŒFfxp$Æ"Áž0Uÿ0Uÿ0ÿ0U 00  `†He00&U!ÿ00 `†He0 `†He00  *†H†÷  ‚uø¯¸LM×!Xz‰Øwª‹WÝ8ƒl$‚:",ÿ­ HK¾Elš¼œÜT†mUh”dÍãÆìè,Ö1µÅ{÷G¬<Ý»K“¦zã°¨×РӲ88ýµ{ž‰›Æ[ÿvÛ¨Õ‘߀>40•ø˜Su×B”Ɖ,t'£þßÑkD÷Ó%ÇT ‡ÒRŒnL5ráLãû®ŸÄÈ€i¢â˜@éðe =¦Zðkþcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping5CACert.crt000066400000000000000000000016471274666402600307470ustar00rootroot000000000000000‚£0‚‹ 90  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UinhibitPolicyMapping5 CA0‚"0  *†H†÷ ‚0‚ ‚Ög$1Ï`iƒ–ãm}–wȃ9ÌÞHêv)¢ÅòQÔ,^p6 Ü…2ùŒlšÃà]Ôµë9܈¹Ÿ“èi¦—G{‘¦ Ÿù?6 2ö5Å¥RÏÀ÷žüæÚšé»UåØŠMH¶ê ^F% Q. nð“ug/ð(ï=FàC^‘áÞ×ÒGæË Ý7à›)Ÿ”k¡y°e´`Å>”_ªm÷­ Øâ²‹U?î:úìåbmö»ãªø‹˜ÞæIU¿>áŠ{2»‹òe)ˆíiô_(í­4dm yÓëÏS/ˆõ€Î€\°³ß•‚Ñà”ž½Å¡e5±¡øG£‘0Ž0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÛ€¹b,ÅÃýóCâfQ%»ÛôÍ0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚ .×91G» ¾wµŒccîø¢•db©ú´½1ÅÅ+-E¶‚j%6ÞVÙTcj•»Öçź9Oª^Ûüû•9¯2c,É%²²g,§µ¬WeêÛvF’/à3ö˜ ’1ý©¬'â›Å;^@Õ(}·ÒÕ6Ã˾5³ÝL~c+@ ˜þ׊òÞÃÕ0D R‹Èœ°ô"ÙU²BÍ j¢'þÀuœ,þÆGruùŽÄÈ\¦I«Ð«Å‡õ ËŸÓ"§¬œ`UìjÙ®z\0âB|O±[—b¿.¸Ñ˜þ^\'±mŸ°:kã^¾C +A›-certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/inhibitPolicyMapping5subCACert.crt000066400000000000000000000016631274666402600314570ustar00rootroot000000000000000‚¯0‚— 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitPolicyMapping5 CA0 100101083000Z 301231083000Z0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping5 subCA0‚"0  *†H†÷ ‚0‚ ‚µ¡_Nû§0€L¥!.-uÑ#Vñ‘nÑ'ødÅ¥%š- ŠÕ Q)¶!(º ~5IfÒ.ë~8@„´¦Sa]‘Õfâ(~;C²xÉisƒÙ­Ù€û²hâIH5¨šÒ>G# 3 8^»Xœ¿·ãû‹^F¸€,Òl´ œ{ËÑ­c@ДÉýcXèn™‘ÏßG‘n —±£¥0¢0U#0€5§ÔáKtNU¨q´B2þɸ0U®cË×âÃqãôÎnü5ô›ÒM>Ü0Uÿ0U 00  `†He00Uÿ0ÿ0&U!ÿ00 `†He0 `†He00  *†H†÷  ‚‡…—Ö;-ªîBþ º@ÛÃÆw ÓuæL1g8 ~(üëm”G†*î¿vÿœÐk€´}ôÊQnøâšˆõZ$áY7N#¾ûô«£wO+ðä¸.fŽÊµë7ž6ú꘬àåC@<^ÆDù/ÓĤ9ª¤M7‘±Ëϳ;ÕϬ\·|p¾Øáóx¸J_âЇ¢ Šu 䯾Ýu Mé¤P—.€øÁ-/Óc[‰üŽ‘Ç$‡¥¸ö㯲&þ¤üë–ZÀ–ƒ¹HðsÕV{Ç“Zeqrïï±'‡üa½­4^í3ý»<Ã’Æ]À¸×XÊæ »ÐW.n6fcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/keyUsageCriticalcRLSignFalseCACert.crt000066400000000000000000000016331274666402600321600ustar00rootroot000000000000000‚—0‚  0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0[1 0 UUS10U Test Certificates 20111+0)U"keyUsage Critical cRLSign False CA0‚"0  *†H†÷ ‚0‚ ‚Õ\ZIfºßtažˆ'hE¹øþ@Ù•°ÑÉçîvvÉ »9PIq|‘B²ú ût '<`¾'©¹ù³¥_Šû"´ &Ö/îdšp?jÑ\²Ëp ÎÐIY’ÓëÞàhWñ$ûÞ×SäÎ~x$㻉c ªöÂC6¬¿‚ ´™T­‘€±-µ`€G¾0nkb¶‡¬ß~O” ý\#‰Œ‹uw€Ê¾s?ˆœV½Ò8¬» æl±j÷ìÕRlWG Ú€@šˆ¹`V–CÑkƒÔ˜tž'Üíä,ïȳ ÈÅôHÑìÐ?eø÷³žÉ!'È_ä?€ˆœqóë£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÂÊiõ´¯-ôœòUË*0³ÒZI0U 00  `†He00Uÿ0ÿ0Uÿ0  *†H†÷  ‚9ŸD[F N×Õ䱿3.™£1Žëµ±½# \$NßB¹ÂaÝ<÷¼Bq¯"ñ§9zZßX¢µP!x5ºÊ(h¸ôw_ÌZeçTß굑––Ú{¹Oe~ïÛÕ3Ç-Ø~Š(C:²Q®ý•„Ü®¬Žµ!¼ 9Gçsý|ä÷H…c2Ȉƒä»“å:0ÍÒo-| 1.Ö©R•ü6]ºÒE ÓêYCVô«= ÞÍ÷‡ÕMÒœ·ë¿)8å¿¡g+÷†›Eć„ò’ÏÇ$3¾@&zšÝ²8A÷ V…H÷$ê*c  ª„úq µ¥Œl5¥p¾ŸioFâ2 )N)Kd+u¡Buä­ç G¤À¹  Q³|áB§ÓȘ˜xßdSÿ<ò㱆Ñ43Úî bšu0Ùr÷Z¯Qk Å7Pç{›6Có$o÷@ i)yŒEþS¼3#m8Ìv!°3J^[Û!ihÅÉ•ºÕŸ<…^ á–ÉÛfŠ–á!£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U4U gü±ÜÂr ðcéÔ›ðcù0U 00  `†He00Uÿ0ÿ0Uÿ0  *†H†÷  ‚^w†hn\†goʘ9OZ“›Õ@àsÉx}< àÎržŸzª_m‹mú\Ýuùïrw®Nõ7 ¶¹Úғλ¿z.È”=×âxî|oF®óé²i»¾ 'Žyknƒÿ¾ñâeƒàt’7õä¦0.bj$”‘Çr5Ñú# Ýdå|\£­“û0´ã†£ýgQ|ÈÜzl“Ûœ')„Öî}nå7ýÁíºbÏ j2$¼9dÿ驤 î ĶF„Ú6OÏ&¢÷µ§ Y€á¯¡“õãøÀ"ºªeàÜPm3·„á#,¹KêMZMG>\Ó‘¢Ú¦å@ÀÂüý/äcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/keyUsageNotCriticalCACert.crt000066400000000000000000000016161274666402600304450ustar00rootroot000000000000000‚Š0‚r 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UkeyUsage Not Critical CA0‚"0  *†H†÷ ‚0‚ ‚¯Ú‘²ƒIO£É Ši\ˆ9,õx_ü “U÷ÁêÞ ëï|£ÎA¢™okùŠ¡u3fÁ ¦ˆu'Ü#-ü•ÅûDý±cÝ ¡ÃÚ^"¾Ö{ÝK} #¬]Ncª=W(ÆC(úZ)1wqI‹²ƸҫŒ'-´ìEüe憜üÃÁ-B£ôáE¹Ôò”ƒŽ…ÅÌ 'Bgó¥—çé,ö„ õŽn7ž^±åMÕ»a gëüÀêY%ÿ$Œ;ʉܾÚ'ØɲðüÁ =¼ºÝ>´s’ìŽ)P Â㻪yÊ=èã4—ýľáã÷Ñ£y0w0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÁJÙ´+Åp~ÎŒ;bXå»—+s0U 00  `†He00Uÿ0ÿ0 U0  *†H†÷  ‚›a[º=¶T¤>'+·ÄáͽÊçøD× œ÷—µ(3æòôŽÐý´»5(÷€\À¡Ž…ýDrŸ¼¯Ö;;÷iÈŒô”Zä’–àÐ4.P.†Àùˆ ¥ØàÚôI-0ÞO2q%7»O ýÚÛâ‡q€>w¾w¿n?…Håp‚#ÚêâóÒyå2_Mˆº]ÎÂçlˆµ±¦©º00Õ…áUÝà0Î1ó¡ÖÑÎÁ¼Ÿ˜›ºåíѤ…t{ %K Š7‹ŒQ¯~zW¯5(ÏÄ3™EŸA³ksœt-”Pßtç;iÿµn T$OÚ•÷%T–D¥ˆ„ƒàûŸÿ:žøwz ácertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/keyUsageNotCriticalcRLSignFalseCACert.crt000066400000000000000000000016341274666402600326420ustar00rootroot000000000000000‚˜0‚€ !0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0_1 0 UUS10U Test Certificates 20111/0-U&keyUsage Not Critical cRLSign False CA0‚"0  *†H†÷ ‚0‚ ‚á¨ä¬eŽKDÛîXg–¥\¢ÅÉöO%]wUôÍoíÐè§¹/m|w 5Úæ?ßY¶×ñTÚ-?G—~³t#a]óCŽ˜ýØÞ¬Ïwñk0·°fwêÕÝóZûO7¥4¬‘£1lÊÎöbb,Àv[ó{€–ÕM)“Z ˆqö€Ë nuOLc)ÕRs¬’õ›%¶âÙ*£5nÝþÛ¢ âåL¾!Ü¢*ù2LyÚs‚‚9ÞU—¦¶º{¥M–›a¤x·õ„Xv^E÷ކ ¬Ë˱âe)þ½A4.Y<Ê£fï>D%úÔzqÁAƒ¼*Ôk9v4:l7c&°ë-£y0w0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uù~R yfDeyÝæCñØ0U 00  `†He00Uÿ0ÿ0 U0  *†H†÷  ‚W6¾Ñ Ò{4~§{ÑÁ79ZÁ·oÚG{Cö Gœ9%ô,¬†uü ~w¾`vy¡EÈç€g›cuÑÕa…$!Y Õ˜s•´rès– F\ŸÜNì¢Öˆ»>nÉÞÀ6]ÿaQÁÞqz¶tÊd’Þg7]ÌiÛõ8V½ÖñV˜î*M§÷Ëú‡YÇßó(°ž/_‚Ê^[჋ÌCéMz©q˜,žúËX$I‹8!±Ôú§üÂS³6pwëD¶¨™\ζš¶7¢ª_ãPæú!eüâÖ›îq§yÌ\_V†M¢Ì>%­©‘38ÓüG·~ט+µiµM‹k¤{·<èXcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt000066400000000000000000000016401274666402600335650ustar00rootroot000000000000000‚œ0‚„ 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0c1 0 UUS10U Test Certificates 20111301U*keyUsage Not Critical keyCertSign False CA0‚"0  *†H†÷ ‚0‚ ‚»–Û”]—VµÖ@'ÉXl dÚIðcžùû‘æ@®N“>’,÷Ö ãª¨ ÿT’÷¹ò-§¢7u Ôí+&“?4ï-¹úÝrI\b1JxªÚü8¶²æ¯!½ç•þGÖḢ£*¡q 8Óá¢úC]ºÿp“5ž¶D†sD­r|¨:\oÉ86æ¡ÐÛWø5Îú˜þù¡â&/樰ÜñQGÞë]Ç«sxèvîÄ¥1€lÚtpiìŽô®¿×DÔ(B$fŠ%Ûy¨ ŠŽ3¹dµ‚xè ræA—©t·fIÑz“xÚÀð-›¦˜ÆÅ wL¡Å©ä: /¤h»­Q£y0w0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U²%Ò(0ÐUhnLµÂHóÊ›ò@E0U 00  `†He00Uÿ0ÿ0 U0  *†H†÷  ‚,XpÈ&V¢aäÀ…@gÉ>Ü ‡ñµBü— ÿÄ­Õö?Эê’Þå‹-z_”ùo¼Ð9I–É,7ÄÝSŽb¶*À‘'›/{ôyÛ¼Èù;èÜ €XL·Z=§ßµ!ÇíPE°ñ”/°@op¨Šuü5Â$£©ÇŒì^¼ÿ8PdK†««ûŸãÛûˆ>"ˆÕkñPï1PΫüÒå7j¨-¾JZ«;GÞ¡®q{Ú™hBƒÑiÃ=aÊ œ^™|¾J’.sQ6…§~ê+ú§ëWÇÖò«;Ø»Î!0P.Ôv l!‚[.‡certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDN1CACert.crt000066400000000000000000000017611274666402600302100ustar00rootroot000000000000000‚í0‚Õ >0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0‚"0  *†H†÷ ‚0‚ ‚È¡K…µÑáð§{&2µòN[¢0”ë«Gü,Lx­ê–úã6xÄ!íéEl÷¸¬ ÛŒŠ,)­ülrò ÿ¶.†„bŒwÚÇòz©ÞbêÓž,gTÿ~Æd”oçåù –òÒ+¸xé,‡!¶õ¦÷Rí8šv9¬™ ’GWH}U†‘bøpìMß ¯2¨Ñ³g¤È"PkF$e@æ„îu!éZÆ,š%EH°¥~54øÒn‚â4¸ „ÿ—ð%Á_tÄÚçÈ„:¹IÉ×®yàòÃ7Äî{ØûÔéÁù½R‹Ì#“ʰ:VqpL²œòÂØ(Wæ(Ñ ¶Ÿ£Ý0Ú0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UAxBFÍN¨‚çá9ß÷©À üï†0Uÿ0U 00  `†He00Uÿ0ÿ0^UÿT0R P0N¤L0J1 0 UUS10U Test Certificates 201110U permittedSubtree10  *†H†÷  ‚iL+½í®Û¨Ènq~ÊÜ Â„ýCñ?Â'9g‚ÿ"€pvé•÷¹lËçfI"‚‹%¤ûvp®/}Jßæå ˆ0¦n!Ö¾ó’6Z+áºÉ%l™–Ú¸ -›„³ Òø‚dm/‚Õ“›Ûèï ªæ·~s?Ñd-rc 6ÍÍXß…M~’‹¹gðîQ•’Aûê8áy"FÛçÑ2dñIîiùvpÄ 1T¥ãÎÒ¦ŽŽ]J‹öó<ö@b+ìÚ¾KFwMYØíÖ y‹j’#)ž°ðÙ ni&Ö Yé.–UfÁ$3·Ãœzx„¿ ç’òŸ_H{ùÒ@W¨Ûcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDN1SelfIssuedCACert.crt000066400000000000000000000016311274666402600321730ustar00rootroot000000000000000‚•0‚} 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0‚"0  *†H†÷ ‚0‚ ‚Ê"€6-vñr$9òL©áú1tw³Ðz4ŽP¢ËÆ•ìGNçº#à@"÷¸át2Âøx&¦vÄI„nVS¥î5ôZ#¶ëu¥.iÔÈó¼¶xŸ#D‘L'ó¾S‘ xL!µÐü<ï %åvÅå\zÜD²@.$”Þr/™\Ÿ#©Ÿýù¢$?ÌâȘ *'7ؤøÄ7ñ Ïäj%É»áVYà}橯åª7ä":•ljHFÒúü«fž>RžO2¸µQäX"·ÑrPÿsÆ{ÁjÊDg ^œ寍KϬ=Ä= Ýš|Á}P™}|‹àýÆs5£|0z0U#0€AxBFÍN¨‚çá9ß÷©À üï†0UEîÅÿãÄÇ08L[Ç]T™rÀ¸0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚´#w«tC j*Ù⬯%Ãváj—ëèÊŠÞø©²ìò¸@¹î¾³kòO ß >.ƒrÓ{…â¾'ÓDÛÓ®¸ÃÌBjrežL±üfkÍ…·8ÆîãÉsÁÀHgw‚=Ž+/«Œ9 Qô×2aUŸ.°ß’J?r,—"¢^Y#õý¢ÜٞȖAŠ?aÿˆhò:ب‘Xñ@—³ÎÚós£ ª\]PÊ“@UàØ`'Êà ªìµÐcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDN1subCA1Cert.crt000066400000000000000000000020671274666402600310030ustar00rootroot000000000000000‚30‚ 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA10‚"0  *†H†÷ ‚0‚ ‚§“ Ü!APQ‰‡ÖG.f϶ږBýŠà›qúÓ{'÷…p§E\–[Uǹ6M”;©’,ÄFIŠEÛlá_ƒ>ßüâ–IkÜ>(‡.ž•óÖË|š¿e|^GÏ]íCË‹tÀ†TQî~–}à v¥õÂ`=@Ø9„±Œ*—½“z±“Ý€õGÎØŠ»ÛŽ82‰/úýªÕûx¿´Ä 0’QdùäzîîVîYDR†bàϧ®çøÿäœÏ_oÓBÒ Õ%n³`<°_ب0|t[éþ…©Pãb™Q­UÆÞ›MJ¶ÅlÉúÆHª£Të¼9F*é£ù0ö0U#0€AxBFÍN¨‚çá9ß÷©À üï†0Uá8C\ÎçKbÇÁ’öf‚ê0Uÿ0U 00  `†He00Uÿ0ÿ0zUÿp0n l0j¤h0f1 0 UUS10U Test Certificates 201110U permittedSubtree110U permittedSubtree20  *†H†÷  ‚f=íðzÇÒöY~ë»*ýCM!“z0œ KiþÀîóÀa8Ì _¢cÈ!R3ÖºÖ|ß“µþ™©q,ž©P—^÷?Å%v& Ê¢íÁÏüº‹Š­Ø\LXÎ̪8éŽL×¹{|…‡` óe=µöƒÉØ6ø/Îr²`?ÖojPeÓˆb+A kõ‡„zÆkÑõ*»•yì“O_ÞYÏÜ£Þ ÷Ý×v­whÉzÝÐ|Í~ÓíÑ'>mÙÝMŒ¨á"°˜ï$’zvò—Å£Ý0Ú0U#0€AxBFÍN¨‚çá9ß÷©À üï†0U¢/Xƒ[L•—·îö‡´—àà—0Uÿ0U 00  `†He00Uÿ0ÿ0^UÿT0R P0N¤L0J1 0 UUS10U Test Certificates 201110U permittedSubtree20  *†H†÷  ‚ÀLô–UbPó6EC€—ÿ§ qo-r–c&z¸yJÙü›¾NîT Bh/.u­¿-L¡S¿ˆÒbWU¤ÿR~MjŠB¸ˆ‡ã‚ëï?Ýh.Hû>ûQ+N¬ÕÆìcé»›ŸàÝ; Oå{¡poNñfí]“ìÙžYñq«6¹=éáà¨ÌŽ·ùĺù%˜i%·&¨ê(µ¢$h÷Ë–ùBxN—9ƒœR± Çuû[y|RZ0ôò•›QDöv¸Ïuf­·8L«vušþ{-‚|Þþ´¶>jV2G$Ör—ž'ïåÚ•ï¾s;Àu=úlMï±Ê¢Ë}certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDN1subCA3Cert.crt000066400000000000000000000017431274666402600310050ustar00rootroot000000000000000‚ß0‚Ç  0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA0 100101083000Z 301231083000Z0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA30‚"0  *†H†÷ ‚0‚ ‚Ä-T¿æ-Uƒ¬…êÓIø¢OÕ ÝlUóÙõÈçqô?§x( : -lÀŽv×k Ýg®›“-gTÄ ˆÝ¸ý§´ÜÞP~Yùišõx†])©…½®Jq`4èêÂtÂDªZ7/;A7Ä9dI’1.D“y{ô*áð(/â© 5ʸȯ 9ª%ÀEaò¢ô,"‰˜Ý5ʬ,ÙÙUÍ}0+¿§‹³‚Ž5NImÒ':°ìñÛ p X¼JŠ:8Ç`´}ûS~GKºÿaJ»‘®jïç$nVq=¨ w7¦oÊ+)å|ö8ï‘“ª‡aC”¬—£¥0¢0U#0€AxBFÍN¨‚çá9ß÷©À üï†0U'IäÙEúl˜”lüí Ã$RmUD0Uÿ0U 00  `†He00Uÿ0ÿ0&Uÿ0 0testcertificates.gov0  *†H†÷  ‚‘þp™Á!™û{z|käIÿ&ùÜৈ›4œ÷/ð„tIeiϬ?â§«Ï™¥ä·¤=‰¬Èdk á†x˜£õÁ‚ Mö,¶M¦l’Œ=Ú¨ JœWuƒŽh¸ö=€%›fSªOÙqk6I¬çÚ]úŸ:Ÿº\Çð~YѳÜ-ûa:QZ›ú=þ/y0,¬ÄO!G§-àÅùNÒiÏ[ùŠžƒ‹Éùp¹bIxÅpKÇÒÞ¤át©‚;‰KÊ:¥ý™5I­C8¨nÏÒ£{@àâÓŸ@WÍ Š7]XáO2kV‹h¦ÖuˆÃfË]Ã"€a…àE1£‚20‚.0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U£WÙ[]³`ök‰Q+‚à s¨{0Uÿ0U 00  `†He00Uÿ0ÿ0±Uÿ¦0£  0N¤L0J1 0 UUS10U Test Certificates 201110U permittedSubtree10N¤L0J1 0 UUS10U Test Certificates 201110U permittedSubtree20  *†H†÷  ‚—.±:Òëu h¦ X(,êÍ"Û”~õ"%S… yêNãnò”›«”®Ñ¨óSg±È_6ÖcÀ¿= ÏÊ!û¦!Ægø™"õGG<]½/â7ŸÐO‘îIÆXå·»<%r"¾o1þÑ@R—ÑnöIï’+c¼ú,«¢.~ÿKÒ·TE:¹@§Ï_ ¼Y¹Ã”<ðj½)¹Î2bº¬›Á|3~õŸóî6æê êtU?V;4Ù2Ú.à‰‚«RCoäUuˆ€Ï:ÉÛë2ˆ‡©%5·oQ惒}´xGíô£¨ú4——Q]+»Ø¨|QÙ$î”?w¨8certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDN3CACert.crt000066400000000000000000000017601274666402600302110ustar00rootroot000000000000000‚ì0‚Ô @0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UnameConstraints DN3 CA0‚"0  *†H†÷ ‚0‚ ‚Æs² ó6"¬ÐVÊðí`Ý3X‹„Äĺ™NÒËà`P ýªËQüoñ†µêTg,íª‰×ˆÖ5I5¸;¦ÌÝþ‹6ˆïI‹« ­ÍÅíO†üÝ&ÎéàÖÈ1<Äó6 ¡U“—Bå*à;4wý[h$O†Â¦¸1à3+Aä‰By?DiÀ(ÿõòHöŒ‚nÆ¢|­½ZÍ´¼—«ºmݨü¢³%ï¯fA/rôòh$B`F5))€úDh!ðØYúrÅëL¸hО@øxrPF¸ˆ,£TԒѹ®q€§GÛEÙ"¯FŒ½©4¤éô>ºØ ï¼Y&sÔgâL¨è¢0v¨…Ó(xñ¹GÜdÞt²4ÏåaRøìsüX,Åáýä5ä/ Š ÔQ…•ÂÒŽí¾˜^Oä¥l/à]©ÆË㸫¢,5°“Üq6Ÿ8€úÕyÕN÷r4‰Žð*Åoòª\ýí¶certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDN3subCA2Cert.crt000066400000000000000000000017431274666402600310060ustar00rootroot000000000000000‚ß0‚Ç 0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN3 CA0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints DN3 subCA20‚"0  *†H†÷ ‚0‚ ‚Äédßý•û¹ªt±¡ÏÒ ë¼ßÒv¢éHMnÒäjóÞ8>YÍViÓæK Ô·3È,†ê1  ³™¼”Rà~ÓÓóŠ9Zt1\âêZ¥ FË÷Žù g$9çú‚AûâìP(;L‹³ÐôfxÐÓhÑ1O°×ÊÆš~ý×jß?vð•Ê¥ '[R° 'ǤJ¥q×¥*¶ÎâÖ…ƒ:=…Ú§-ÛÆ¦h¾áå¦iãÁ0¾0U#0€Ü[¾Ç7Y¤Š@t| E.C‰¦Û­Òù• ®€ ñVÞ(Ðt!Á3Ž.ðÒÌ€hš^eüŠs85\*ì$ûsØ 8ù÷ ¯tµQÕ«¦HnAàZ(ôõlïÛ$ñ¥w޵Ι*ãîwfÅh/–V…ÒE¦Ÿ^+h»‡¢1 –¸j[“$™£Ã¦`Ugéÿ:9›ÆCv+ô@);~^2ëcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDNS1CACert.crt000066400000000000000000000016721274666402600303340ustar00rootroot000000000000000‚¶0‚ž F0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS1 CA0‚"0  *†H†÷ ‚0‚ ‚Ç&H:ÜÀgÙþèZzP §R–X«+Â)+Ó·Eµ[ ¢u°ÉÌÐr¥ý•òþÿ i)A¸êeÚÀNj&žèâ/€V™tÕ]W$òòIåN©:*…¼â~Œ¾D*±w°¸@Á§-…Æ…ÏrH+É›+ú8NÇóÎÿ`4ôØ)t/‰è7÷L.·(Š>1ÇU¢}+0 ‡nàyw„øJ~Š¢&àŠµä7‡Š« px¢øzZ\PVB+E™bÃ¥°òn¶J/A)~G0iü³Ó#Âô >N–B½+:×vâI”𸖱yƒƒúýCÇü©„:m J©n@J@@WQ£¥0¢0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U±ªðãÏÌÒ§‰¦ƒÝÿnÚãI0Uÿ0U 00  `†He00Uÿ0ÿ0&Uÿ0 0‚testcertificates.gov0  *†H†÷  ‚6s’¾Ì»9sä |y‡Õ5ÖŠ€Æž¿±û¯Èú›$¨hÇîPßÜqßñ9ác+[P ®ÖM¡"ižà9š¶á@2×,mמ²|G—³ Ø¿žïÚ? FÔ?:Wæ­Sȧ3nÒŒ)[À!'{¬ôýõ{¦Qp½äÂì±þrŽ Zº•Dù‚p̺­0«EìCŸ§ÜÐ+èÒ}5®j´Ëh*~þUçc#u£ÿ³uO— |ôçG (I”R™”ÕU`ϼe&¥0¹k«ýR´ÏÓE—ÚÉßy‹ÿR—ý7ôŽ1øÖj- K e59Bƒ&µ\A…‡tÖtÕý²žµcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsDNS2CACert.crt000066400000000000000000000016751274666402600303400ustar00rootroot000000000000000‚¹0‚¡ G0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS2 CA0‚"0  *†H†÷ ‚0‚ ‚½ø¼5}N?HÝÙ½ÛJ‚22,UèO¿‘ÔkUDléE¶—‚bN^h_ö4w—¸n+wDsG“²Üi~V’½X”N§,DÂiÊìg ÔÉE¾“½>§ßÜ+Ý }0áÒ9-b…ö=öf;PƒrXÚÎEÿø¯q®Âçû•Wï|(¶,Ö(9Û“+K8Ö ÖLr»%N†ojgÇÆ”䕌J«‘a§(š}Ã`‰×61Ï\Â>ÃûÁAc½E1»¡§²…¥?‘ˆLÀ1¡G{\8›-þÊQ ü%i.ÈB4ÑSe¿@ç©~Ótbxœñ5ÝΘ… w ,ÖuhãU£¨0¥0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UFHœB Ž]SpØàÁÉ5 0Uÿ0U 00  `†He00Uÿ0ÿ0)Uÿ0¡0‚invalidcertificates.gov0  *†H†÷  ‚†Ž=·ëmjKŒÎb¬`G±Í0EÙ­8¸xZvNVš$á+c8f§ç“I‡gñ”ì{#¦Yà#n¹bça‚½ÇÜ&â\’J‹#YC$ßRÕšhÿ@¾Ÿi±¾ õg*| L2_£ÜÍÅÃkËt‘¼.îmyÚ,Ð'°ÇI ¶©Ëª|múhc¥¢ì_çàÉÒüJŒ€ÒÔ¸Ï"Õ1$”DÖÚº2T;{}“Ï“åÍ>æ{ëÇ–ìØcŽÿ¾èˆµê»AI}{ H䎬Vtü8ø:æ1øÌí:Sÿ§V䥊UÈxw³,ž)È0iäMˆŸ47åÐW ÓlÅÁ¾Ç8Øùe|ÈŸ290"RázWé¶=ã%²Zh%IÇg›}ßLïw¯½Ìr™%Mñúxí¢•¬è‘$}|ÐTç¹—솊å_õ¥ÒïêÒÑG„z­ð è¨hC}+™zýM_ÿñÀ ¶ɰ™ç:8½¨2BÆ‚ëeZ>þa–œ¼?ÃÝô ‡SS€½ÑÔÑIY›õÝ7ge„2Ülzÿ6Nåú^ÜØRÖÓ6¯2††3çicertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsRFC822CA2Cert.crt000066400000000000000000000016751274666402600305620ustar00rootroot000000000000000‚¹0‚¡ D0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA20‚"0  *†H†÷ ‚0‚ ‚åfÜSáMçýâ\ÖN9P¨ìÙÉ`d2èÈš(å< o\”.9~àÕàšq^K±ÒTÊß(³½´ä”}…‰Ú8Lñ†^Øæ^A¬©'Õ˜€a_g©Yª¦ù ¯ªwwÌÓÛ9wu6I5Åxîæu6ë(¨Ì—(JQAE··åzvÄð‘sT"æDõí©ŽI¥—¦˜ùUg¹¶?=:säé/Ç,¥5Æ"ºÜ¥”|Ý2G˜î­Œ^;¿áƒÍE„èN™ë×½TÖdÏíõòqEE° n<‘ؘkÁ7:å1ЪÖw2g¢hNÔcª¤Ëmn…£¹²IÙj4Å=8þ3† y£¥0¢0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UQ€ÍúIrH<íN ÎÎ@ep 0Uÿ0U 00  `†He00Uÿ0ÿ0&Uÿ0 0testcertificates.gov0  *†H†÷  ‚$ôcùè .5tÎnɪ±Íð)+ãÕ%g×±ÝkX*ÞÒ×QÃj§H;ÿØ5tqñuñSØ^P#“G²KTî@1T·Ù'›·«`ût7“r¿¶,Pâ>År°³•Kºˆið +´¾Z&Ôªò dO‡%œ%‰÷‘#Ư‚u0 bf÷k¢ù,¨<ðT"IÓ' º»çâßÊÛ»½m?Iˆ5©ã6þ"’Ë;õ³=í¦*¨MÏì3ÇE——M’‹ £ ( ™Ú%­³'7hÔçÙ—ƒ¤AR†7w˦ûÌDïW t8ÍÁÒk°ü…ºâ§2~xNÛY_/åîDÕÓw2Tß\×ëçcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsRFC822CA3Cert.crt000066400000000000000000000016751274666402600305630ustar00rootroot000000000000000‚¹0‚¡ E0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA30‚"0  *†H†÷ ‚0‚ ‚¬t¾þ| àÃÞáçíxEЦ­n/xƒnµr[üd j ”ÜõTIL¡Pª`o¾…чm{µàÿçÓƈÅuȬH€Þ”Á8üsA…Îçͨ0ÔƒÍÜÐã r\cW‘ƒæÊ§ Ñ9|VžE HŸ¾C®)æ~ãuN7m)?¿¬‡½  ?$ëu3úUG¹\€å÷‹§£DŸÚhÞ£ÒZ¸™òæÜÕX2«vË4ŒËe0žÈ=x?büu8#h0öØ)Ž"Ü¸:ëvä›X"ªÞ¨ÉôdnH704K¥FqUQo|texjê1MAS…PDV§ñ>Ç£¥0¢0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Ušº9MÚ!u¯êAÃNâÉ•’[é#ŒEQ“ŽÄ)\$V¿¶¨œt³EêÐ>­ãøéØÏ~å[×6\0MŠ•c_Œ7X¸,¤Çú)¡˜] Þ~ü23n‘[øùÓqïPsæ_£H죧 H0ÆÖŠmÁ¿.È€)Ú) œkÈ‚E•W>ûjç½Qm5˜›¦ÕÕ¾îû™Ö;K|  TE5=ìˆÊeúÖ'µÿ2$!{¤Qñ_4ê_î§þäÿi¼öò—certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsURI1CACert.crt000066400000000000000000000016731274666402600303500ustar00rootroot000000000000000‚·0‚Ÿ H0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0P1 0 UUS10U Test Certificates 20111 0UnameConstraints URI1 CA0‚"0  *†H†÷ ‚0‚ ‚§ç,Ý«:9¹ÛHI—°?×,b^ªUÁ §ŒB Á0tjɸÛ‘”Cê:EûÓÐøÐÞ‚ª99¾ï~í ޲t¥Õ2¨yŠêî“UÄmûèžQ)£Æé’ª Wˆ»›j|³úø¡!Ù"” gÏã•‚x¬Õ^©6œ|ùY–ZwÏðû¿n¶’mˆ‰Š3íUH±"è‰x0DÖîê£ï@Ê$ž,þ~‹Œ€‚¿‰4… ¾¿i={JLf«–O_2»jجœâ²±i·Ð€˜ „PM_Yc âÓåMp$“ ùSŒÇù{ÀQA3 Ø1ÏvkHcc8³£¦0£0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uú(­AÞ*hÈ#?&Þ0Uÿ0U 00  `†He00Uÿ0ÿ0'Uÿ0 0†.testcertificates.gov0  *†H†÷  ‚[麴yÏÖ%L]£÷lÝV O,eNª¥o¼A#¡€V€tù3è8Y‰óy(â>úêÔ׫aM8¿…¾Ú jû³ Ú®+NuDÚÁK‡„_Íúz—Ÿ‘’ʵ … ;Ū–.TPkøÌ¡»„¢9oZ«h¤~ˆýk(÷uz’ â|*Bë=[&µ|se|§.ÓXNÿo¬.eTxh«E2Ÿ Ý£Å5+~XVÙ®W Ó&Äåùžá9z©QKå)sncùÌ¡¸®äÆê{æh¼²{C¡©£zÛ#ÍÕØ›]’ßæ}öˆòpäì½în¶«R»­™¡àH…fcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/nameConstraintsURI2CACert.crt000066400000000000000000000016751274666402600303530ustar00rootroot000000000000000‚¹0‚¡ I0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0P1 0 UUS10U Test Certificates 20111 0UnameConstraints URI2 CA0‚"0  *†H†÷ ‚0‚ ‚¾_€'¬ÕcúhѶþý* øeêÒÄ-¡ü„X…ï8ÌC˜„-³f ±Ö›êhufˆ4[Æêå÷;t`@ýÑXóÉN0M(-ø Ft^Ë›/Žøœ äA¢!êÃ~×¶øêlP5æÂôšæ“úöD¼ò){Zæ\l–`pvt~ìáÍ(C„Y¤¦bµ¬òz»˜–¯K -3%”… ˆÙéiødifŸs3¤ \@_:ƒh„ÿ&ÏÍiÐ].Uñ7"ä3·$?¹xL3ŽeÞ¤ÿ¹1 +fiP¶<'"qÁ)•éòHRê×oCýVÃT˜éäð#×J,¾Ž/£¨0¥0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UMë‰qßð²úv:X±º`ÝŒÓÃ0Uÿ0U 00  `†He00Uÿ0ÿ0)Uÿ0¡0†invalidcertificates.gov0  *†H†÷  ‚f­e¾JóLôøŠøjÁR‚ËŸŽ8øÓÅ; ¸­ˆ9$ûái¾£Ž’3¬s(¯ÖŸ»jÌá•Ãbkæ´Üëõp¼õùŸÞuW.J4Ɉ± ì…€âpÛ7áïPoné}S§gbfÑ…"ð.certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/onlyContainsAttributeCertsCACert.crt000066400000000000000000000016261274666402600321020ustar00rootroot000000000000000‚’0‚z O0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0V1 0 UUS10U Test Certificates 20111&0$UonlyContainsAttributeCerts CA0‚"0  *†H†÷ ‚0‚ ‚ØN‘Øâ{È(Ý÷M©dƒ{OˆEƒw$ÔÓZRßÜ[ úÍû?URû Ù"œÌ@ߊ~ÄÐQB¯+ß#¼tQP[ƒÌÜ}óE.}öl»÷Îq=Ê!³ú*'²e”3íseoP¿Cfiç‡Ây|€l,¸ß¤îvD:ϘPéo©‹íÝÅ}R)M<`38vD×}ˆhˆõ>S(ƒÄh&±¥¿ÍgQ‡!9Ð¥Fà£WƼý¤«vzÄŸ1_HÙÞÚ׉Øì>èö¶=ïågÑÔC2pq£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UMþö-¼µPMß™zm3pN0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚¼Ç޹‘BÚt…ܦ ’ÎX®E7b”5<‡Â¼î¤ ë(a)Ýý‹ÈC›=?º×ÅîÕ,!àµmT5´šÝîÕ ))9g&þJWãnÃŒW0cgDoÏßêˆgEwŸf b*jÜ?¼ Àº} &A­òt¼Ø{½\_îî×[ÛÎòøòàô;VHÄô{½Ãƒ¶w_&€/+(·;–ƒB¬N‰4ÔEÉ«¼˜n:°¼ÕÌÁ.Á¥žª"x†—úµLȱEùQ`Úo¼ ½“=“-Q… Ÿœ R»G¾¢r ¢‡â¹ÿ¹ЦmŽ åmì_Ë·7?Œcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/onlyContainsCACertsCACert.crt000066400000000000000000000016171274666402600304220ustar00rootroot000000000000000‚‹0‚s N0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0O1 0 UUS10U Test Certificates 201110UonlyContainsCACerts CA0‚"0  *†H†÷ ‚0‚ ‚Ȭ—ÿ!’2! ½¸?ÆŠJû`eãe¶‹‘Íòs“}BòÄ™Q¹DT‰ïLmêNÐzâzÞPæõ]´dg•´YõÐCíKäãYŠa¥›º!T ¬ æ"?l€ø-/¢ ꑌ¸&óœaÃÛ§ƒ³—XecWË·ugßEŸŒJHÅÕÛ€L?ç–»€;Ó©™à¬ uý‰«r÷j£áÀä(²P`d9uD€ÔÜ$C3׿o33cÉ›ÿ¦%ŒÀ‰ÐÆ<øˆ\"’˜e`K©™«ƒòhÅ=Îk+`í#éÿ”=ÔJ[·²«ZNÖù‡Mœd;2øM¶éŒø<àD)±¾œÙcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/onlyContainsUserCertsCACert.crt000066400000000000000000000016211274666402600310500ustar00rootroot000000000000000‚0‚u M0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UonlyContainsUserCerts CA0‚"0  *†H†÷ ‚0‚ ‚©M½0BµœîN[UÞæÞd'ÆãGß•éÆŠâ@é}ny,+–c)Óäa;t2Í;+ ©÷ð<’¬rÁOXÇlØEߖƥ﫡ò(ÚùlÂúáW(IßýTÏg4ÙÓ*æ½cùè^ÛöC€`p{à¯Q}fYãQÝK­®Kx¦y £MÞÕíàN¡6 C¦Ý@3 'ôü»ÚõFz´5Ž&ÊÎXR" zi,Ç Äó7Œæ˜ŒÝ©¶%î,;ÞšÝ+/¹ 0€­· Îp§{ Îßäñ… K¯ÿJÀàÞœñz—HßêGEš´Hâ,'ÛK ݲ€A³JBº‚å£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U¼©ÜÍþ–ˆ}µžO™Þ$Ò0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚òAʳ—¢¸höAš‹h{Sîõ꟥Ý8prãÿ˜ ú‚$÷4LŒ–tšNZ’DtKv[í®4r‹µnðÈâyÇ¥Qa `”ûœŽG5ä^WÈ9z(·Ô"ñÆà^‚áÛzVIòïFÚ@ö©ÿ©·ãqePuHïûkk¨ð¥w”þá]h=X· ™2 ŠLÊ™ØéI?+ª²ÜgXŠ6@ǯ½=ÈÀ%/÷8ÔXqiÖ(4‘"¨N£ñò%$ª£[Y¦hzPq1fL·¦aàs7È”ZAëc!3±Š ÉFÔÕgw˜`ˆ’l׉¶¦M4ÒŒóÌèš#certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/onlySomeReasonsCA1Cert.crt000066400000000000000000000016141274666402600277530ustar00rootroot000000000000000‚ˆ0‚p P0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA10‚"0  *†H†÷ ‚0‚ ‚Í ”S[»E¢ šñÐ6Q E.Òlº*NcNšÐ)œ¦çÜ6yå ÛÿÖ‰Õ”ar —½?FçíÎêùbÕÔÞì 3¤í®è€¨\¶¤ö˜†ààBç/ˆGâù¼ïä¨'°Gs‘>ê{F¸ì¬CîªRZ÷(µžA‡2ÑF£ïr˦°ŒÇuszûkG‚ Œå­¦‡CSè"„m Ì0KCˆ§HµF>Âr«±"³ùºvºá#u5§•z0Åç’ô3ùÓÏ´"“ÙÃX…˜®e[X}JÀ½Ô?¢Î†Uwy=‹du9Š<ûå¹\UƒS骞hö×]pcų–ÚŒ—£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UPhÑ A'‡ç N·xVûŽîq0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ žjZ µÆzl¬û4ê¥Bè5À×S§B$¤ËÂXmÇ-ócLLRˆnïu8jD|!Ê™XïÖdJUˆ."¤1nÃõìøÕ·/¨9§« ª€kvvK>’9hñÆašŒ¿UÔŸÃ} WsMÊ”´PÝ'ÿF\Êä'N^±u%z@nxGÅbýŠ©£ßhÚ^?Ö¸‘®#ªþ›†¼°ç-Œ9×ðð˜¦+!õÈÕêÓ"5o3?:º¯±öÓu¡ímÆF‚üu>zÿc—íÇéêSþaë©7 xzw±E줇€•²íö$ö24šâ6樞ÇÁ­æOor˜¹œó˜Ôcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/onlySomeReasonsCA2Cert.crt000066400000000000000000000016141274666402600277540ustar00rootroot000000000000000‚ˆ0‚p Q0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA20‚"0  *†H†÷ ‚0‚ ‚ÆA:T¬xg¿önwµïÙ¥ÀZÔŠf“<èîŠÐD(ùuv®Ð[*š ÉUÝlý}{ã'BŲ.9i8wòÓÕçö`NË˹Åè`ùò¼T†‡ŽÂê[ZÊŠgcáV•x 65šFÿ‘SÇí‡=ÓÌ‚ÿJ„`¡¥þ~ ¬{ý?Ä\eŒ.l6à@ï·é·©3£ðˆnmÀwŒµ?°¯(„) – øê«A‹KÈí}©»bôQ®E_ ¦k3™Ê/r˜`I,ι5« ÜÊö2hM ry…CW˜cÿ’œ7PùÏ›MÒšl”¶4}ù`èö>ÞVØg©“yf7}£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U`cßÒ#¤)ÖA¤¬Ê†y˜¦eH®0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚qƒ±–'ÝgaûÅïœ(¬rDŒ[¨—âj=?B[÷l/Ç)Å7’„«¸½9¿¯¿‘s¹ ûÒ5w_õ’ñH¸×ðÅHõ²}aÛñˉÿâAAó E 5¡º½¼B˪#n0¬†*ÒT^¢²è±œ|¦¢QQƒSø7Õ¥$ö² ïtü“·ÜñöÒ>ßëµí]ÁGtð ÍmF<ôóN`çWÌ @åÿÛ&£¢ ¥ý"–ņƒ^àïMÐÜÈ­°â«¢RþõÒ ¬æ^Á¾_¬¡=ÃâûmGÜ„¬l¸bõE޲[†u Ýαߛë3ɇ•.certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/onlySomeReasonsCA3Cert.crt000066400000000000000000000016141274666402600277550ustar00rootroot000000000000000‚ˆ0‚p R0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA30‚"0  *†H†÷ ‚0‚ ‚Öì£|ëà1t/Œ÷5‡ó¬ŒØo^)å´N.}(Tº×Ø*ÀÌÍ' ½'ì*<þ èMJ‰ºÍ–®'qnëjpb‡a%œrÏ¢:iÂÚŽ¡Õáˆ1,íx‹3kscÓ¨“Õt` ”˜'e§¾¨ãæL2rKd‰RŸÈul‚˜nßÏÔ5æÂñ‹:¦ó;)Ä„#›ƒ ‚S¡PÄIödz7¹š(%¼XœÈ“„XÝ+52¼ì]§šÂ`ܽ|v2íQlðؤY‡“¿ ·î®¡öèÐ4BóØõËñ;!Ý2z&¢×SnëÄ“‘"%ÙØ¹.‰a¢é?!wüø1M£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U-$·—‡,îÚ¾Þ—„¯ ¾k0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚Vtզш™eW(B_­>Ai"µöÿ«È¾XÎS¢µåAQ¢ó·ËxgxF³6qR܈â*F«ö‹Tvã½n‰wð  v{êDƒ§yˆµEz—ÚÆK e›Sžïgè.!ó´ž­;5ÓôM Åsñ­‘e„ÿ`ß-Q©<Á.ÔDS¨¬p±ÎvLÅŸ€ Πï°÷Ìùùˆ×q šk>ÞϬh€<Æ=¶È€Œ^é[¡}3Vè=mî§3GÆÅŒN°’™{© …×z6Î÷,_;9N@£=¤×«*Õ/·ê—þ£"ÞD¸í§YÍæ/Îyb ³å.ßÁ²„¤“ -&&–Éàcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/onlySomeReasonsCA4Cert.crt000066400000000000000000000016141274666402600277560ustar00rootroot000000000000000‚ˆ0‚p S0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA40‚"0  *†H†÷ ‚0‚ ‚œR S?îöŠ ¸k²T”j¤ÝŸÎÛï;ÄWF4MøÍ»rrRSà$þŠÈÍ«#Ÿ9TÖêbR§kvðØh’¬Â ?„¯pÓ}3ƒ¢t ·˜Ø!RF0_̰Òâ>:xRWÚ”àŠp­®¸¢­-¾âì‘´ùמ>žFñƒD±Íœm‹GçX'Ô‘Bƒ¿ÄQ½Vé)£f%è=wv/IÒ6=K=βLðã W bKy1D?£°žxxÿJ Î°_Ó·Ë{£|0z0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U¾fÜ ;öÓˆ4‘S& hnÉ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ ©´Ä>í#\ íä`R]ÚÖR‡•¬DOÈVƒcºã&ØNábíÏG<õ8꜒ÌSmW4n©0(¹¹…@Þ6mgŒS>£µ›k‘ÞÂN×I¨7 ôæõ u„×ÅÌøJoòHø‰WÛc×ÖJúaÇRl¼m¬Þâù)öbmò#á¸%âhiPœºÚÀF±Ê¢£O¦Ý?€ÛâÏ&·þr²É—ª ±rô/In÷ Íç­1»þú‘C=`(ÌÀgÙ‡ÈñǾÚ`»/ÊA6†ÿ½Ææzß3‹ šYñ!TÛ»+ÎàÇ^~ðLýp°‘%à뇖}çÛ¾ ÇDÁCîcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint0CACert.crt000066400000000000000000000016211274666402600302500ustar00rootroot000000000000000‚0‚u 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0‚"0  *†H†÷ ‚0‚ ‚ȼÓzµ²Aw®TK-ïT'-®Q ¦¤éï ?·k`V#K‹»ßN̤ìHîóð–”LQc‰< iM™x$´é„W@FZÉ)|Âÿ¹§6¶*¼à¢Æq¸ÔF!œ*Ê7µ!ž/åèÓÑÂéÜy§5qjÑ„–V•Žgœ±ìªT•ÞùøÊ”B,D‰åÜ>éã.ŒŒrP¹(æ(+pk¿=Á»Ö¨Ø$v©Øo^ß·¢HôT·¥L±"ƒh·9%X·ïšC%âø†ùQWæbåd!çdåÍPò†Ü@/lý„õpú>zÔ|+’ß:nî»u°? ÂRS^Œ:®]£0}0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U›+²J<ÅnPÉ"½cÎ ñŒ=ú0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚@Ê+æg4N%²ÓÒú)~ñBRjÿ~¹úªœ~Á¬Åí ×ZGtÈ€ð]4UZý”ó{+Sæ€Êä–  ö%µ¶-ߨ³4_èÃ.°¤ŒŠrxo½Gë¯n<5Dbµ«Ó'ˆïr¶ß•æf´¾zI9ç¬ÓWù•×l<ç¬ý;$~\™]ܡнî þ½æ³KÈ!/”O\¬ˆç­ÌÈß A´¥±Ko¿ÙèÂ¥s¦Ø¬†$×”g(ÅŒ¯Ý`©YÑ’è\ûʵÊÛž+‹jP$g Á§é߃u2XwáøØú\o•bHÀ]Er¶¦]_jÌ8{«ŒüóŒcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint0SelfIssuedCACert.crt000066400000000000000000000016271274666402600322450ustar00rootroot000000000000000‚“0‚{ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0‚"0  *†H†÷ ‚0‚ ‚®¿0Ãþú.õØn½œÄë{÷M‚NÊ{/æ¡â$]Ëdߨ…Üí’+·rÔ(J…›e#» ÎtÅ£kÀcòÆ›W—3´L\`l ý«Gê}©O{ );¸Üvôr…¦fhú€º÷fáÀ¼Ò9‚å8_Äl 5Qãh]wÞk/ þxšr†m’Þʰ§-C«B°œ¸L¥ÞxxÚY詨øeÔsìVRÊÄ~ =]¸¾¿8:­›Ö'kÖÝмlÈ—©[ÉqÉC!Q4µ„vV"¼¾2œSŽøçE™^ר^røVÝœA*ÊP ç66÷ŠÒ„<Ù£|0z0U#0€›+²J<ÅnPÉ"½cÎ ñŒ=ú0U€ës¾M™ž”½KZ÷ÏWwtÃ_w0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚=.LýpBÕÕÚ÷ÐîãcbÙ:Ò2ë Q’›Ë·hv>,ê ®sK§Ì(ŸhñO|ôµ¨5w³ÆR²ƒ§Ík!,ίeê5‘š1zݲGÃÎS]Ü~‘mÆaƒç°jkˆó7Mó£³ý§ç© TªDnä{ˆ:U߃ÞÒIÌW¦çAøì›lßôxkáOœQD&• µX¾2”Q„^Eä =ÿÅ«½›Z–;ËÉÞñ›&ªEWLIœ* Jš%¶ÓÁOË”¾P-Pi,'Ýëð#ð“Eæ,¸êbÃ„Ýæp JÑòõV8÷“ÓQ¥.»‹æõœÓ‚qJî'¸certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint0subCA2Cert.crt000066400000000000000000000016331274666402600310470ustar00rootroot000000000000000‚—0‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint0 subCA20‚"0  *†H†÷ ‚0‚ ‚ÃÂ;¶1~\–m¼t¥lš¨Í2©,”Ùq*\bžu¸2­ÇqÄ1»Ùuù´ ‹†;iB<†ŒõCûÇušóŸëµ»amå«U±Z¦¿KP‰¨•Œ‡Â!0Ž‘iø€3®ëx@,0fs:Ç3GtaµÉaß=µê^Ì' Ð1fVñ½½~¼‚—ÍNݦWæáÏ›,œ½á„Ûgä¹ud5@.C—´ê‚°‘$ IM¥Ñ:äjP+8v¿î,ue9Vá–ÿ¨4>gØ“r²:¶¸<í¸f¢§˜e ñƒxÅYú–®#©…ÜÄV¢áAôvõÄâ2E¹äÚüKï:Á¹£|0z0U#0€€ës¾M™ž”½KZ÷ÏWwtÃ_w0UÆ *û¸é>h`zǗγXQ{vÞ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚–`…˜N÷ µXlPEc¾4/ôy,cs¼{«Øê7gv0ßòzñJªØÙo`2]ñCx¯Ol.ð¹q«zôÀ.T£6öT+êñ/¡“oßçæØÕBÊhÛïGZsLiªíÕÄs"í·÷h/õ[4çP̨ø½öÑT îúÖ¿ ¿…ÀÕ]Ê´­‰Ü{"ˆmçÕ¿„l^°Óüf>’)?’õ\RA~z\”Úùï:)Øì¯œ®gÁLײû)Ò–öÉ£9Rs9Kf¿^ãØˆÒôTóájÀÁ)2Á]Npd;\ÓS·Ç”QæÜ—¤šŠ»«B¬QÛñŽ—)ácertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint0subCACert.crt000066400000000000000000000016321274666402600307640ustar00rootroot000000000000000‚–0‚~ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint0 subCA0‚"0  *†H†÷ ‚0‚ ‚­ôüMt$ÔOÞüCz¾?ê2 ÙÄ3èèL¸ò™žîÿƒÕ…ilF½'Œ ­¶ÌšMà«ß½º:ý˜VAjýøË¾9 Á{\¬¼FàKÝ…2gœÔx„Yaf#”/ ßgC Ûò?e8o÷Vm|û^öaéìáÄ›…ÈŒÔö@&ìD*¤8\V.—m(V17×Kö¼g{µ¦Á‚¦ð#^¯]ûª$ä»c~«MS+(œ… (·÷«|§,²½Õ.Bð§— e’º1‘X'½3e=ÁðD‘ƒ×¢FìR+Äð¦†ÓpœÑ­£|0z0U#0€›+²J<ÅnPÉ"½cÎ ñŒ=ú0Ubg}Ò7ÅrÐ޵ʣs^0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚.˜æÌß‘LŒïæ42‰ ~Q ×õoÇ“xmÅÏЯ9ž¼tbH2½Š öz‘ãò–öa×R§ðl¾zÚ ¸ªëòòEºK œ©!E!'"‚K™¢JPÏe±‚YƒfÔ?0b˜Ç÷«—òÄdäùêRd4¿–›—|^°ÀÖ|w@3©Þª<ÔU*€šnØ,"d¶{íT_Žá|óÙ©ñ!çÂ.m> UdPIâ߻طã^7Ù®ë Ä;[…¤"4Ccertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint1CACert.crt000066400000000000000000000016211274666402600302510ustar00rootroot000000000000000‚0‚u 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110UpathLenConstraint1 CA0‚"0  *†H†÷ ‚0‚ ‚ÃÌxâG°Ezo—Ú q@zּΕtwg7ƒfÆþ†Éq ½eAœ&Ì É…nââZDÚe`ùwûf·YR«µ0HI.±¦3l‚O <&ÓM‘hbéÝ”oРE¯ô 0ÛŒB,]òÛ0K=¥r<’‹‘ϲÜÑçqgP}›N[›‰ƒ"¨œK«=÷Q›ýÌÔ=µŠG¸GIâ÷"£—”·=׋]\?ÍwƪÝF”¬“ëH.Ö‘h nQ‹ûþoÝzc¹BùÙçáè)|”¿Ì‹þÈêÖ_êâç3™cØ5f ËÖ_#ª<¶îS£0}0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Uóäq`ÿÞ&…3~üÁGgúÁ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚6N*ˆ"(@J‚;{ÿèVŽJ×ÈX"˜¨®Tp±IÔ]½OùÞée`E‘¢z¨¡à²ãú‚Nø˜bk-¦ >:yÓ ÛZÌÁØ:ÈÿVäõjC^ÊåÓöüºÃÏÕC’f.Ù‡¡ \ÉŠKÜ}eëMaugކF~4«Øcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint1SelfIssuedCACert.crt000066400000000000000000000016271274666402600322460ustar00rootroot000000000000000‚“0‚{ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint1 CA0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110UpathLenConstraint1 CA0‚"0  *†H†÷ ‚0‚ ‚»ûÄlӿЧó¾‰,eð6¶|×Z¦ˆõg´¼ÿ³Ð'ƒxªï\quÁÌãJÏt?NÓÐ(ÒH3½¸ ½Gë§¼–—{¦>&ÙÖYÚ) kÅÝøFÃPøSxwÄ¥§‰ØƒÁñgî ö‚½I&Iy £_Ð$ó[¡‡¯ œß˜‡ÞxÚÊiÈ(1DŽÆÝȯ(ØcWB?Ç?)paùœúx4Yif¡Ú? ¯f‰uÂÙÔh‘)‘\y¤ˆÔºW€D”÷>d6•X/äFÚ¦XóÆw¿óaüÑ›![O’ ãÊ;'CÉu:–)§Ã¢Åj¬èM&jQ¯û»Â°ÿ¡ñÈê^— [PheÒr Þø¿óØìús=V`T°œèy¹M³0Véç [íåÁDyëN¶Â2Ûv¤— 6/ êIÖ³6y!\ÂW]ò®Cn™œJkh&a [P÷)“ÐŒ`¿ä“lOÀöÞTL\˜U„™Ñ†Îh6ï+1òp;/Ucertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint1SelfIssuedsubCACert.crt000066400000000000000000000016351274666402600327570ustar00rootroot000000000000000‚™0‚ 0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint1 subCA0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint1 subCA0‚"0  *†H†÷ ‚0‚ ‚¦Fޔϟä‰<ÈÂ-3-gØÎCþt0TH—wðç x, &kK8jv«¤+¡UC"ü€0Ó.ØÌMAXìŸÓ01T¤£LÛâÎm¬aà»x~Iù‡ûs^ýD‹kq°¸7ýÏ_3òšþkj³7%°2»J¤Pû·qêÿ\vt)ø€„ã{\¹!¸Z-R–ö&Ëâ‚Hž¼÷É*X¸qࡹ’Ü»ì{ç‹”x ŠÎˆi4Ê÷ZÿGR—”输³¸Â/’#ëd›"*Ë£8nðH3kÀäúpEEÂr_·s£@IôŸ–q'l+õ ‡Õˆ« ’4 ´°qU9о¨å®jq£|0z0U#0€å™–µÇ}UB­ŽÇ%öͬy0Uy‡S):¾èÔå4ƒ+ÇÖ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ Ÿ¤ŒðBoµ>¶›}¼ÎR!°qTKZ¾s=\i¬è?U0¼”üÒ³Ž×c`„ä¢5ßG›ÔýËj+´Œ‹³ë}™ùBÖ ­6ø™‚=pd‡œ+ê=ßLe]é¨Ä¶æLƒÚ)rÄ›•deœ›r°ëŒãq‰¡UTHw]3z¨³ãØO­X«X´–”¿Ü8ä¦8ëýõγ”ð™nˆDØØaÙϤ¾½_'ˆiX^Sb—#q­Øi„¹ø Ðé'™—ŒÛÝlë¢Öp²fà“?91‘oBìW¤kD­Z=÷™F‹ëjÉ+”²TÜ wfˆ'iܺ¿certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint1subCACert.crt000066400000000000000000000016321274666402600307650ustar00rootroot000000000000000‚–0‚~ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint1 CA0 100101083000Z 301231083000Z0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint1 subCA0‚"0  *†H†÷ ‚0‚ ‚¾ì:o ïòšË¢íî’%¢­ÄÑùÒ&zS+°(?1†ixƒ¦Ï=_61D &ž Ÿ‚Yï>´$FÛe|E¦\΃¸%3H­‘–…ï<:Õ0ˆK¤ÁªíVÙÒT܉‚G;®Û¬:ø1·hî$‰'G`0c+ÐÊ2”!N4•w¦‹±ÚD·c±3mëû*Øõ.D[ÊA±ÐW¨!÷ÖÔÙwD‘’õ§¢BsËŒc4=¼3ŒìḎa½uoµ±|°¬öl ëšmŸ·-ì,Ý ÿû‰½³™ØFËëMP»S§¼…„1eí‡,CFGñÞ¿ž‡®w™éÔ«£|0z0U#0€4½d㟎n˜%Ûe6®4•ë0Uå™–µÇ}UB­ŽÇ%öͬy0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚K@<Ú}"à!sðýJ,hî+Ëüß„´} Ça¿ÌG3d•`8Õ)¹lîcMܬmhɯÕô´‘÷OÍ€/»¶¬tÑhͼ烈û0H9œ4—Ý?áÀ±uýžP*ašž‡/BgpG¥DˆòLßï×TÙk†Y¹Mˆs…©y­yd lrîW“Gk.ù«™ÂüµZ1Û Y Ä㇈¹Õø}Ùú¼}妹þã'Õ2þ7äûçþè?¿_8G…„%œñXn«1´YVgQQÓT:G<Åò;6lç·Su 5l;µNvXzZçìÞqùX‹@èÏ_3ù0yàÚZT$‘«Î{Êòcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint6CACert.crt000066400000000000000000000016211274666402600302560ustar00rootroot000000000000000‚0‚u 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0N1 0 UUS10U Test Certificates 201110UpathLenConstraint6 CA0‚"0  *†H†÷ ‚0‚ ‚Èk˜¥,Ò¶&u´Wá¢Ov”"Œâõ#>0Ƹ4™Ò+`Ô?i… ‡˜×ªÏ×ÃSë—ä²G4óÒlGpLâјÎ©ÚPT¾´6å–’§ewú¾¯ÿÕ‘ ³è*à¹%4ôõkG&¿[{vRçiíTLÿG‰PK4$ßi°ZLßy¿37w%Q™Á˜‘?š†! \2Ø^ꎡã“>Xó'wûtÐØ‹2®dÐÒBƒÿ|.lvœÅD:€—°"ôuT²÷óŸ÷lÔ*ÅÁðèîQ§a?Іé^«Gè­»í¼E…IÙj9ˆï„fëêÝöw²üŸ^ÞgoncÊ“£0}0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U¯¼…®þL®á—#ˆÈ¥±` ºNØ0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚0«ïCz)=¸J„áý»uŽþCZ¢¢·9þcƒÈÌ‘‘²—†F8d—>Á§â>ÞÉ€–"S¿Ga8b?d׃Ňl…s<1ÞHŽÃ¡}7ö­gö÷/rxVwÔò]6­p°jŸÖGr÷i-rÓSB×Ú?­‡ˆØþˆ¿‰3Ý!Óîéõ’ÜP“dao[¸= [C©Höƒø&wZÒ;Z‘½YªYðßì&û ªÆË?ŽŸ£ïGf aÿl2_ÅMhL]Ê-q?j£©ÚÖæYrõâ£|%7ÄpAÕ±7ßa_ Iô7)j·j ð,ª–—à¶Šsƒ4ÊMºÊ¥x0‹certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint6subCA0Cert.crt000066400000000000000000000016361274666402600310560ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint6 CA0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint6 subCA00‚"0  *†H†÷ ‚0‚ ‚é€d ¿¦mƨ¬m Û”1JÏY#à´e6‘‹©rŽAL•½aðá7Ci¶¹v²žà(«ã¾Žfu‡½Ùµ¥û˾q’ßö>põ£}Zqq=ò¤ä¥Å{NïÙ.œ2Aô§ƒæ«`Á<[g7Ík'  àæ;TØXòU•™¾Ä­Nóùˆõä8²ª.T¹G;¢7>ãŒF½'†7Ÿ•v'L8¥LÕ?öù§×A+ühwW,t ª•ˆÃw­‹È°Ñ#ð0òM¦½Án :%`èÁï)ÚoÿK1•p™Â¦«MÙQ³‡°ÿçÁ=ŠŒ£ŽÀ[ ×£0}0U#0€¯¼…®þL®á—#ˆÈ¥±` ºNØ0UÏvvƒs$Ç£mg|ëRÀÔÔíH0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚@ZÁ ½ÀF—]9ÝäâŒó¦|óe&6þô‚ë0¸Wœ•'蕟J=£I)¡hªíÛ–lÕT0oU ®~”ˆP®ÿùBÓ‚‡ŽµêCÚRÉ •œÒ´«àµûÀ<õn×г™šØ-©rKạ̀şJ¸m©ÐйÝÀÚ…n;›¼8p&¦qŸ ËÀnó"S:ÖìŠ4ïÈù”ȸ¬rè˜ÍLjå/á·rÛKüGAê…>ÉDJ*ç°ÊË(^Â¥oLnÎ ÷1`ãDšÓe€íê?7œ3êìÖs;gM‰\é3f§#ÖØ¦daÏ[Ôfj³"áƒK¿É.ò‰zLcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint6subCA1Cert.crt000066400000000000000000000016361274666402600310570ustar00rootroot000000000000000‚š0‚‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint6 CA0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint6 subCA10‚"0  *†H†÷ ‚0‚ ‚Û—ÿñZCpçÔ›u?Š ŒkQÒSÙöº4c¥ùU9m mOT“E;8¬M°îîÄ'¸®%b!7Ei_siŒ:Ž,e >©4~E€j­t¨54ƒ¬Šèpðè=õôÒÇôþö%?EX>p ¥—«"#Ê}8š!Ü ?T8w‰§0Ñmül8¸½i 3ëòÍ;µnl+w»àfž ¨dQåÑ…•áÚ7÷N†Ê™{ÄT v:b\›®h‰Ë²~Y¢µqaˆ³rÉ𴆀Tý7PZ´ÒÑÈG;a G¿Cêv±©@9_ºäyåVMñVèqs_̶…-2æŠ×q4ž]¡Ð'£0}0U#0€¯¼…®þL®á—#ˆÈ¥±` ºNØ0U<š•ž“^Vbé[8lš:n’Û÷ 0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚´ùîDÍ„ã…ÏÑ Àå„!»ÕîœátI¨û¶^h [àŽ«æ0¤'Žâ7öØ¡W…Ϭ­Y.2-Þ¯Y!è¡ÓjæY׿ª à d 9}¥•¥eú‘;º¾æJÃÇ€ö)ö<²æQÆœÇò„²¼6€5-KD¦ ³¿ Ÿœ› Ö¿¡ÞÈf0ØŸH2i&tщ|hº­÷éíELš È0"µnw¶‹‡z/”Åz)èKÙt• ®ƒÝà8ü¬N×€6$”Í„¤$[_!Àùl2ÜÒO“¤k0‰ˆ‰gþ¤‡~ŽEŒ ç5 ‰ÕMA %¼”U„ËëZ%\Tû{U½o™1×u‹¸¿ªÖ¥}Èra LÏfàsª;W=Ù%§kE¯$»FmrÛñþ††‚ú|ÝZÝ^ßtzã0}0U#0€¯¼…®þL®á—#ˆÈ¥±` ºNØ0UI…ÛKûcÙ™(´ zžZw0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚fI…f—²ÕÅOËÅsü‘¶±1˯Ÿ"ÊüÊ~îƒ?J´jvÑ^ܪE½KxJ+ ,ÇînÙ`ŠÊE5w ùÖ{Jêx+ÄÖ41ˆ;¾šº»U ÓT@gKê=ˆ(õo|}¹?¸ÐâÞ{H¦íEZÉAG%Bsç€(%+/UISÆ“½ù0˜½Q_³geWþ°}î–æð`á÷~]%x¿¥DaÄý•Ò÷ðw¾}9®¤V­Ã¶ªºJÖ4ÜllÛ9„cäó‹m2þG XB¬¹‘Í'™ð Þ„m~3Xù_ ä\r¢$^i%"ëɤ·²¿ü\È8ƹ‹lÊè¢QLaæÄW“5¤g£0}0U#0€Ïvvƒs$Ç£mg|ëRÀÔÔíH0Uº¹âˆ÷ÔY%Šã)ßO 8Ýqt‚0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚BŠ;Šf.q2Wé˜Õ£*ÑJZÿ2ÏMÒú\XµµABy²?¤ØC s޲õCJw§Bö¥þUî†ï Boâ2hä RjW®‚¶-¹Å̲T2¦Ð°wæruvcFñ3¨ð'L÷gޝ#c›%Oþ³~þ»¡IõþW»Šr´!GïCÁòþÇþ[ù2 —Y #€ÃÈYšGTM¬‚ö±¤e^¨GƒÛçê 1]çа’ËÂQ|{ꪖä“BîÔ3$ÌfËþeh>ø—Œ§}üSÙF{¾>]ˆåþ¥J.¶DCrW1dÇSä{àYíŠÑâP—”0‡s}¦certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint6subsubCA11Cert.crt000066400000000000000000000016461274666402600316530ustar00rootroot000000000000000‚¢0‚Š 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint6 subCA10 100101083000Z 301231083000Z0V1 0 UUS10U Test Certificates 20111&0$UpathLenConstraint6 subsubCA110‚"0  *†H†÷ ‚0‚ ‚»þ执óì„’ÈvMj%#ü¤Õ/KÇ QچѷÕ/,/{9‚ Ü—ä,ä.Ã3~&gKÄ|mMJÙ"ƒãÓäªt6ý$%ä¸%=á©ÕÝ1©þÌìôuYÝ÷§ÚO ¿€gzŸ±¤È~ƒ©çï{Ÿ£0†Î¹Ëi wÃ5Šü>éhî  œHålÙ딲 w±% *Ÿ¯Ã1ñ¶áÛóWœŒ=TÇòeØ·üoñ€ýé;ò¯¢ÕR8ÉL6Ðu Ì/\9Ø5[~.nq-…IÀù_ï6„0,6'’@¿>IÒ:¼à8YAö´ÑÈ"ôÇŸ‘ª"Ñ£0}0U#0€<š•ž“^Vbé[8lš:n’Û÷ 0UÓ¦E^g}”€s¹„Æ[µ1¾0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚O†çÔ·+õC8äêO)ýGŠ‘æâ`£óG6ù×Ajþ Ú£œµGC™·–€Ã”bÞ^˜ŠÚ†‚%„¥¶ÔÅhG¥qû$ËYêç!Š ²~~Á˜ÜsÞ.n÷€€ìË[ß«ïåždœ\Ê–ŒN~ÒAèM™¹zž+ß_ç¿J"< eçVpüÙŽZ »úŒVL×N¢Ucñ)Ö¾Ð$vºævùHdÎãkÈâ¿ç°eÎóêŒQ2˜$<çÇd˜ J”œ¯&][ÇLþÌò‹-𮿿¡Ã°´HV/ô7•"¿á»7Hð{ßåeü«-u„ë certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint6subsubCA41Cert.crt000066400000000000000000000016461274666402600316560ustar00rootroot000000000000000‚¢0‚Š 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint6 subCA40 100101083000Z 301231083000Z0V1 0 UUS10U Test Certificates 20111&0$UpathLenConstraint6 subsubCA410‚"0  *†H†÷ ‚0‚ ‚Øpl5¨JŸ”ר¶‘‹E#p 7¿ÿ¸’àášz±ãRO¼ÇD³‘1zrýÌÓ&*è¾ ¿i—’Á­r»}u"DØÆ”!cýÇI¿å„ñ©ã4¾Á€2ïWç;Ë+Y¦éêù€:ýµ*˜vu¼Aóð-x5¶Ç–'2<®-«\?ô°/ô.Õ ƒ­¸9™Z [ì ÃQH¬çŒT8¾ÿb™^ï'Q™Ú¾UêpOy­+jöÊ 5‡u6³&ý–‘r:Èá©8ÕAÒ”““~4i *U»)‚võœ%ÂðUfŸªÿÜ$·+»þŸÖ#£0}0U#0€I…ÛKûcÙ™(´ zžZw0UDZ¦ÏöóÈÇFïd¡õ[Á?‚¼W0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚·?«‘3C¦ùÌŒ óšõe¶"ßDSÝÆŠ‘¨‘·cÏ@6Ôµu Ò#Pá×»üŶ4"à‰›ÆóëP#•Qâ,¬ßQÀ¯>M÷}q@qåÇ@y¾(j‰Ó‹*)D3©„¯Å•<8žárMë\Mˆ‹ÆM™˜>T‹- ¯Ñ}Ëqa½\ çdBŸ4~‡BÂ;9O°²7‰k[ªÞX–0=µ,µGi'@êÌH–QËðûƒ؆ç@ÓjJpŒ¹ÝÚ­p3D»µZ`d¯èq+3Ÿx!FP}`2Ë$é—p„FÑþšZ.æ€W¢¶ª6U_ ù 6l½certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pathLenConstraint6subsubsubCA11XCert.crt000066400000000000000000000016531274666402600325130ustar00rootroot000000000000000‚§0‚ 0  *†H†÷  0V1 0 UUS10U Test Certificates 20111&0$UpathLenConstraint6 subsubCA110 100101083000Z 301231083000Z0Z1 0 UUS10U Test Certificates 20111*0(U!pathLenConstraint6 subsubsubCA11X0‚"0  *†H†÷ ‚0‚ ‚ΠÑFO~vËÃh§po)­Ù›oh½( cʲl Qiª´°ª©>ÖÖÂdpÅǯ˜ÆÂ eX¿·\¯žß³QÜ,!„{¾i¿ðCæ‡ß@µÁ˜zN-­ ÿQèM¶Š³8H½l¸Q£|0z0U#0€DZ¦ÏöóÈÇFïd¡õ[Á?‚¼W0U¡í¢ó5T¥Ÿ¼cæGjS$lJ r,0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚LÿíO:¢…€šÂ7“xv1dPBÍr3?jø xëå?P§M¥ÅWf¨9€â\)Þ‚ø X…@¡Ü¸ˆzji*\Aß‚™|ío±oƒn»(BþÆ3?£ìB¾7Ž%­Í±‘ú5ø1 É®´i½=† ·.b$X&·ÛM§o Ѭ½.˜$Í >"ÉcÑg‰ªhgÉ£(¸F룪Ÿ ;`%ðªÖ‡ÅÂz3±€ —ê2ˆý¥NGL¦iÞ ¦©dg¿J–½øðÆzGã½+lKÖîgS ý†..húš þV–à£Sdèž(ñ–ðIˆ·áoù²™£certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/pre2000CRLnextUpdateCACert.crt000066400000000000000000000016221274666402600302240ustar00rootroot000000000000000‚Ž0‚v 0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 Upre2000 CRL nextUpdate CA0‚"0  *†H†÷ ‚0‚ ‚Éh¥½×‡} &àoعY;½ÄÑ !;n-ñÅ:n¸1×nŽ<ã^Ž×Ás :ð¼Í&bX‹ìöJ$X/T×J·¾¤&ó8Æ\x±zé¤RiðäÓ_nûé?»z¦jcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy0subCACert.crt000066400000000000000000000016421274666402600316630ustar00rootroot000000000000000‚ž0‚† 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy0 CA0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy0 subCA0‚"0  *†H†÷ ‚0‚ ‚ÖBkéM=ÏêüiµFøHƒÐvvŽàÌ€‡4÷ÏâÑG©ã°¦ÅLUv2À¨X 6‚ÁºšEó®’–Yº3í1WaæZ0ÒoŽ50rtòå¶x†fTÙä80o!:»ß¹·þÍêѹ(MÈæêoǃ¹ý™‹.XÚëc?ÏÓÆOªøÛžH$XZ¢¡z?òd7ù­.°&âa7ÄDÕ…€Vâª%x“"_±Bw:óñÚM¥%Úý×›/)-Ð>ÏàL± ²<à$ C)a1yc†Lᜱq…Ø'1£áã"í»/‹"¬,’Œ•“1æÔ£|0z0U#0€¹ìߺR"¸¸¾j÷¢Õ' Ög50U¾bxý;½nœ 3ò;2ªAóå‰Z0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚µIŽü"ùqÁû§é_eº¸Ô—gõ`ÌHí¥êno—H9†¿IFºôÃ(J¨ÒÔg‘Ÿ“úŠtñê#±Hû'÷‹ÕOv'•AÞm[Í ¾Õ¶ hø<âåºè¡(§½&îå©aßÔh–ðüû”™uùÝ"oŸªÜ3b&œÿ4½åqÂg£ê'ÿ5üJòê `@î5éu DßYÁæ;Ž˜Ð˜™l ÈÿQ¡1gŸØèoK"€_I¼„Ì1Žª—¬özp÷q 7¨úñº#±ç˜ú‘þ¢€ÉnÞØ%¢=÷nq«‰.¨Ûê|ù— ‡S飸Δ댘2certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy0subsubCACert.crt000066400000000000000000000016501274666402600323740ustar00rootroot000000000000000‚¤0‚Œ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy0 subCA0 100101083000Z 301231083000Z0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy0 subsubCA0‚"0  *†H†÷ ‚0‚ ‚»bhL<Š€öÖ#\t¨2ñÝ1jê ÓÎÜ…àZú1h›=M2tí2S…¨ÔQëª=äKµx½å`ë@†FØâ?'MSFETœ7Åýìµf²¤¸va4P``õöêÆvgè àJ¹ôü0y·UDš¸È)ܾc*ëå”%(œ9r}Öû½Ÿ“§£Š(ƒÉŸ DÈ™EÜÄqm¼¾À„uŬA¥{_B )oV…V]TJN} ²ìü‹…uýIþœílGKÃL«”ÝŸ\¯Ù=˜rðlål¼¸9‰Û‚F ‘kõÄ6§7°1VMxOÅmëŒD:U£|0z0U#0€¾bxý;½nœ 3ò;2ªAóå‰Z0UëØ—zz#5äÏ—$'"Ìg§VI0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚• s÷àîÃ#Eõ™ ŒM>þ„\,틼.L•¼«õ2…s¡¼UÀ²HÄE(0‡-|_eXº…i@$ðuS¤õÃͽÆo,‚ñæ°ј›÷­ÌÌVAþa¦y°ÜÓÌæŽÑÐ@£bLåŠ ¸|ûÀ0fÝX×£þ¼' (ýbA=g€Uè4Á >þz=2Ý_Ì&‹u_í Ôhœ®´çB»Oö«Ù×Ñ®æzŒ\O¦&„KÁ­Ð°  AY¯AÀ#¢LÀxBÝ4í7=Xoów¡ùbÊ‘Š÷íª oæÞhêíÖ‘£ÔLXж$ÇŒt%Qcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy0subsubsubCACert.crt000066400000000000000000000016561274666402600331140ustar00rootroot000000000000000‚ª0‚’ 0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy0 subsubCA0 100101083000Z 301231083000Z0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy0 subsubsubCA0‚"0  *†H†÷ ‚0‚ ‚áß¼ÝИA)R)E×~®ÿ°öÒñÛÅåˆ<¨³ï2 þwGp¯É;«ä6xÙuu¨¾ŸÙD‚Ëû õ$[HÔiÈ3ín»¤—xOiC½P+ix*6ùÿ7É» "¤†ôþjÚš÷¶Æí|ÁM8lHÙrAè <‹E5x¸¼}zYÝ‚YжWà(j“jËib[£EŒ¦üàk˜!„Šû+ëtðÌ‚ïkÂ-•ÃáÔäWÿŸèGt£íqÍz2Îw/U°»’ä“>à£#¶¹;iI\)^úZ¢Ý‡Ž #ã&1ýM4›ª(oA‘ÏùÓ#w?¢$~2mql#£|0z0U#0€ëØ—zz#5äÏ—$'"Ìg§VI0UµÛÖÈ /ZAÇx£D‰ÚÎ.kº0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚;Etá䓆ºjj=yÉÄ”ÉÑ?}úa¤{- L³™½J¿"ƒ€‡tS ÔŒCe}´&«{üøAq„¸Æ u’”EÿÖ'ÊsA´‡í û\rHžã6£fïHN2Bl<ªU‘?Ù[C‘îrÏ—ùmd)V3q WzœÊÀç6W —é4.°zri" ’>ul6iü])Dˆ}GQ^®G0A– Ðâ·_¦¬ß°)åg«?Âß­’¤ÖÅSH˜ŸßRÓ³ù±‡6Ðc8¯z`FÍÙ­Œë:0ÔW½bÿ ßycüº¶æ±”›eRx/DZËCY:ü’Bº¼ââ™Ü^Âcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy10CACert.crt000066400000000000000000000016461274666402600312360ustar00rootroot000000000000000‚¢0‚Š *0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0S1 0 UUS10U Test Certificates 20111#0!UrequireExplicitPolicy10 CA0‚"0  *†H†÷ ‚0‚ ‚óÚM…yþLF¥âuþ¢Pè‘WÀè÷¬ÌpW¬1ñ"ìÂÏÆ4½ÿ<šgo¿ÛþÓÙƒ›mF˜ñPíB‰,@«Vç³™ƒ Mµ#ÖõzTðÁSžqåš#ú^²#µú­WÏ9™’•¨(W@Â1ÌF7Z)î<¶û áÃ/ÐBá J¼žz ñãè†o¼­1-±g¯Ì|þ¡!É{DÚ.]e²AÃÎ;ŒÿuS Yá€â<ɇ÷3ãU4õt÷ôH_ýYË)™êºfÙgóF훵@šÅ×á”׺ÎXU2 wA—ÝII<ËÆðovb%ï,”&îlôäî MŸ}žV*㒺׺bP ƒwõ:–ðp e¯Ë©µÇsxf¦è9¤ÃÆðPö²ëŒ«\¸MîçF6kþq0¨­¼˜&¸UôNH}€@e¬Ì噊òôcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy10subCACert.crt000066400000000000000000000016441274666402600317460ustar00rootroot000000000000000‚ 0‚ˆ 0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UrequireExplicitPolicy10 CA0 100101083000Z 301231083000Z0V1 0 UUS10U Test Certificates 20111&0$UrequireExplicitPolicy10 subCA0‚"0  *†H†÷ ‚0‚ ‚Õ_@Š–~2ÎÜOŒ]ô"õ)r²í& !¯a¢¶æ:ÀŒRŽƒe—*cZËd’ºc’¾Ù§‡ÌüÜ®Ì]Ú87˜nxXá)t8';,}ð<5•™œ\Ÿ2óŠD…ë¢(ž,šJAJ’¾¿:.;ö¢ iòÇç,&ÂÑá[—ØQ?&kéÌ‘V\B+Ã7×/GÞ;©ÞDhMvÎw´/ T µ“JÛO亳3³G_,VàÛU‡ŒŸLhm¤Œ}r¸¢4*eÉùÌßû瀓æ#2 ÇÊKúŽ&D$¦!€ÖÛ…‘Æ…kâ²b~b±cŠÀ«M5…ËêA š(V)£|0z0U#0€óLÑ_Õ€Góø4,ä˜ÏkŸ0Un¦a$hÛ.–&7¯Éx)V0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚éä²ïŸ Ž¿7úà ƒ¾t÷Ø)²Nøœõ¾5uÖ)—xÌr¾‹°ìáóvCï«•piõÙ­ÅlXûfÞøÓ×"YgŸi&tÏl6kdž7’ßhó‘É?,³k‹”†)YOuY‚¿Jþ3z`©l€=&Í6$ƒQ‚×4U¡ilóä`hAðÉ…»ÔÎgê–†x浄/« ”"Ü iŒÎLW"(ïK­ ÛNÕT6z‚RÜkµTBqÔm(Ξ‰UÝSŲŽxhË_äˆÑmnŽ"ñQˆÅ›y0)ì±ã"DÿæörþQ¡¼áã„Óûcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy10subsubCACert.crt000066400000000000000000000016521274666402600324570ustar00rootroot000000000000000‚¦0‚Ž 0  *†H†÷  0V1 0 UUS10U Test Certificates 20111&0$UrequireExplicitPolicy10 subCA0 100101083000Z 301231083000Z0Y1 0 UUS10U Test Certificates 20111)0'U requireExplicitPolicy10 subsubCA0‚"0  *†H†÷ ‚0‚ ‚·C£¥)†ìaäûïpÄoi­oDéÎ÷…ä%ñöÜ I=¼´Ï2µ9,3^ofùŽÊ…R|«Ù[)6º•ŽÇíIi÷æÆÁÉJ¼ëñµW½¢›BÉëÿgñà[=zÓ-rÍôà*  ß¦°šþ½ï, +ãêQÈZúÎ84à ðù©*5»qÞÚö¶¼a_’ò±.á&¹H ÐU¿Q%T-תBD·üì ÕBo%¹&_wðƒfKl}¯áH¡ÁXõ¯¦ELùš¼U3¤/ G˜ÿ Åt­:•©oìIn°|®—ŸDÖfoŸ¼ôµW0Êvño< È_—ŠÒ1?­X±£|0z0U#0€n¦a$hÛ.–&7¯Éx)V0UXPOòþr$¤Ðw? –,wµ$è!0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ÎTÌ„ˆÔà‘Bû=£á¶w(ÙÚôÎ{aa쬘ãËgT¥gêjÝr*·‡oL^ˆçSJѾƒ°«DQ¾ë ¿;Ó<®ÿ5€×`©—ØÁ½×ÏÃù™úž÷Hj«F‘b9É’µ¢Ǹ©ë }²e=x…¯¨™Ñ½czõKá"òŪÆ`ÍïPиºèhfìÞ­Jù~Ö_8kG«‘±¦vË,oúÆÔ½"+}3t’Cîë}^×ñÈxÈlÅÆÊSl–BíZ¡¤ïVjÄ…KÐZM¤ä´¿%ÏëÖøèPµVC´R}:ª%ßkBC±qkZ#-ÉÊ1certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy10subsubsubCACert.crt000066400000000000000000000016601274666402600331700ustar00rootroot000000000000000‚¬0‚” 0  *†H†÷  0Y1 0 UUS10U Test Certificates 20111)0'U requireExplicitPolicy10 subsubCA0 100101083000Z 301231083000Z0\1 0 UUS10U Test Certificates 20111,0*U#requireExplicitPolicy10 subsubsubCA0‚"0  *†H†÷ ‚0‚ ‚¶ ïyÕ:0_ü?V' ÁÊ{ŽæðCý˜Ñ$Té€G¥^hH“ÿjsbú6,@SÎ!cèý]ViÆ@áÖ!ÓùîÌ6Ô&S=}I}ª2€ \j程ebå¾qƤáŸfš­#þ²Ô§ìï´\n ‘o3DõØØ3¡E¦;7û¹åâ4\}H2è—™¥ÏÕÙ. €-¸4û'î$A¥ *óp¯vˆšœeÖzÕªŠí¼ôø4×[µà[Hž–&ÁúÏÀC쀾aÁ¬žËŸY€íÂë$ÿ¢MV#Ö oyONã<áÓxj9>¨Àgc¯%úTKt‘mC¶çò´y~ë“ôë¢ÔH'‚€´1¥T¼!-.åcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy2CACert.crt000066400000000000000000000016451274666402600311560ustar00rootroot000000000000000‚¡0‚‰ /0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy2 CA0‚"0  *†H†÷ ‚0‚ ‚³Åø¹ó‡…ókN…i m_÷9ZF­aõs;ŒÉª´ÏFyF²‹Ð¦¯»M¶×ò­xìÈ“­ãºíÉ]2iÈR`ž…¢î‹zcâìÜ(²Ò~Ýpw|1•x1Iú#ÖŸ-$Ûá©n’è~KØú©ãÛ]g~ ¹,ÉŠ£Kê‘ÈWâ[ŸTŒ½Ä×Í?¦nd·”m#ªÍý¾¾SJÜrõÀÜ¢k±è½Ú ÙÛÒo°›; ºþD(³Ê|ÁÎý%IÌnäYrÔ›¢ÀˆÑ²ìdî(Ǻ´‡-Ì4äÆÿøÈê®â%ƒ‰]™ücç•á (*ó£Ž0‹0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U6©Ùûª8/ ÷L;Ù…š£-©Ç0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚Ðý0‹in&Eò8(T+ŠîŽ\¢zŸ†Àeض{*Ùð!gµsÅÂA<¢Õ:Я€ˆÏÀDGGÙ•Råxã8&<…ȉVµµàO]»¯3±Ìæ”Sïñ#ÇNå¹/OUÛÓäòöÈÓ3HW–~†­¿„AÑ®Z…myÞ®€3”Èš 9ÄFF/KÄ4èSÈ løx× N'ÑOxÂz™ˆØ\,G_ÉyfÊNÍÄÙ¯õ¢ÒÉM÷î˜ —ZaŽ”Ì¯ZÎÝjâßiàôßm€ñ‹¨O’È _RÛ$ŠJÝ—OaÁ¸ØŒÂLé,'jÆ'&Û™‰í;†Ô ä7åÓcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy2SelfIssuedCACert.crt000066400000000000000000000016371274666402600331460ustar00rootroot000000000000000‚›0‚ƒ 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy2 CA0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy2 CA0‚"0  *†H†÷ ‚0‚ ‚äŽ#£ÄO¨fx¥fa¾©¨£o=Ÿ—GÚÚ zôZó•ü8€ í¦øó$«½f]twÏà ¿¨ŒÒï•´]:s%NŽ®A)MjñD•ðf‡'`п‘Ãÿr™Þâ ³7rˈELôêqWNĤA!ÚöÇÜÞ8§ï—Aä‘Gå³TÙ-­&PÌT êébŒ„ª´R0M} ×ùR¤CŽ"‹-QÙÐ5³¢df¼/Ø9®ÆQÆ•sº›#Á [zƪsÛ.ÊoÖ“³Š¿ÊŽ:jb8ŸÇ›yñDBì1ýÓ-‘É /w³ó—íºú|ÁàPŒ4*ÏÛ£|0z0U#0€6©Ùûª8/ ÷L;Ù…š£-©Ç0Uï«ÚØá€1§CîÄv ¯ìmò`¡0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ h VkM“[/Go¶A³ï=t Í[~¡¬­ÍL‚}íIŒîåm¦0s‘`’‚õ’¾+ÚøÛ`3l.!¢Eüû5‘ m­Õ3@k°¶ÿËNÞ)9¶U—Ǻô|P˜Oüª[ÇígƒTØýg ÓE¡ ø¡í£ñ%f@Ê©\B±4%í"ÏÞÒ_ ÐÇ÷CQ0® XÆ£lGšùÁ@…Æ;†.dÏx ¡/\…c Ã9‰ó†›Ü’þKÅ]ÜDzŽtÍõµÂ:‚ëÉÏZ‘Î~ V žÐÌ,i芆‘Q7´Z ’³ñÝøl hÊQÄ÷PAìÝròu¬E Écertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt000066400000000000000000000016451274666402600336570ustar00rootroot000000000000000‚¡0‚‰ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy2 subCA0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy2 subCA0‚"0  *†H†÷ ‚0‚ ‚Â|ÒR˜Sý 6—‚¬Îù]–Þμů.Åq•–!d4¦OË2‰ˆ|€âå‘ÚÒ3àv¨5õi¼¢¶Z§+ÊÚYÄhn?¿VjÛ_8 w”Š;{.²X€›WuM“4öZØÝ€5u¥Æ1[  UJ™ð3ÖRâS{,ÖjJKôFcwô¦M,Qjq¢»nõŽr %ìæXg~ûÝûºØÙµËͦài’³ƒ ˆ/@SzÜ2,mð1”OîxTâžF„ƒ|È•CÄ>Áb–"]~ô]6s=/ÄÉbÐX¼Pñ<Ò–¨¶8¨¼nê×xf‡Ã$¹ ÿ^ö‚ KÏŽ¹-£|0z0U#0€ wþL0â³Q°÷ƒ˜G0UI gaVGÒY—¯"f0QwPªÜ¢0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚tÛÎïØuvª>•¾5—õÕuiwë'ö Ms Ùà…|:]dt‰ñuxE©$Uä¬IPáP“`9﬇Û6éÍ‚j×Sµêr½økØù*\EÑâC¹NÑŒŠR_Ö•Ó"ÙUhþÌøµu,ñýYD7©ôЕ\À]£|0z0U#0€ï«ÚØá€1§CîÄv ¯ìmò`¡0U wþL0â³Q°÷ƒ˜G0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ªu¯#¤LÓCÙÅŠm'µœ¶úÚ3jgPöoü ¨ªç…_À² ¬©"¨’²ôYaÅDxÖGLÿsF¯ã¶á½­‘¹E«}æÇv¾çþÏ5ëSÖ ” D/II™{iÍ£·´ó¸ƒ#ƒIMžYØÁ¹§t; §ù¿·RuÄ|~‘‘¢Èòm{xKñGì's¬˜è,i•g8 A­]{þŒ#+¦|Iæ–¬h™/®1²³à†1R_þgdž&@}S• |‘rÇeo6¤*¦å”îýµÅ°Œ"Ìúøê£»fl[6  ý¸‹b}ÍEÆÝèMœØ¿“cX}Ÿkcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy4CACert.crt000066400000000000000000000016451274666402600311600ustar00rootroot000000000000000‚¡0‚‰ ,0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy4 CA0‚"0  *†H†÷ ‚0‚ ‚Úø%]'?#AG¦e°ƒ7üK•¤¶ˆ$Ù,H?¬4Mϯÿå ÀÁnT®|D…öᚬÖ!ÖÀÄ Fª1f )þ'I×[3Ó"÷;íÜÔBS Ø]Üžd¹{ƒPLz"a“ë ö V¥æ×è\ïË–¹EG²S5¦žºQpŠÎ]¨£Q¯sÞlŸ Î#¡\›zÌ>¯¾„?˯£Ž0‹0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0UÍÑÜÌÔ1c,]6±žu¾K^c0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚u~ßÑßø5TxŒ]Z²Zždø8¸•ðcKf8hþ`f„z÷²ÔÙ¤Lh,ÇÝ3'ß%Žrg¿ÇâÄ8?þV_äSªÀ¥ÎܬB§+9Wýâ€1sÚ¤2vÔå=ØKÀÅI»Ô©Ãçp$4õI/é-ãe˜Š¹3&ĪÈñ¶Bà§ÝÁÔ2*ÛÈP☀–RÝ¢Ÿ Ôã¢:.œãÊô*Álšµ\»6ƒÚ§€ÑòݶQ ‘ÆPE¦«r%P®Žß1hbp¬Ÿ›ÑÇs™¥3TÂ,°'w,á#³R9.}”‰(+'p/làÃhˆÒ&‚²¢–ržG¬Xsðsòcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy4subCACert.crt000066400000000000000000000016421274666402600316670ustar00rootroot000000000000000‚ž0‚† 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy4 CA0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy4 subCA0‚"0  *†H†÷ ‚0‚ ‚²<@™Q‰+ôßԥ܅ÀE|á¯LÖ‚<ŠÑ´ú ¹ÔÐU¥•P¶Õ9P”Û;SAÈ„h&ïSŠb™ª0LR1W¢ãò‰Â&’ûK.R‹ß’ÅÓé`¿}ênia„NÆ—Í^u˾-ùççqvýºeu$°¿N4®ûócMç¤òö‹ ¡±¿^(Rh•z5¢™'½vßÔ1MíD)©s.2Op9lù_wäg·ÝÑgª6±_÷ºšCaNyã){7ý÷#©;Èx°]Ëx[‰ÓÖ¸cg¬ÐÝ ßOòl¹>“ã†Bî>…:…*=qe®Be5Ö q/f&&Åx{£|0z0U#0€ÍÑÜÌÔ1c,]6±žu¾K^c0U}ï”»ö§—æØ"HCH¬³îº0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚hÔ^U¢Ñ~ÌdÞR,“À6ÇéÓy“õV±8dþ^lÇñÇa§Š*Ë2œhÿÒŒ;|kŽœ–w~Œs~Z– ‰‘ÀSY<­oÑr%6B½‰Î>/üLÞi9 6ds¥®Ò“_ñ¤tí8wg¨J³,7r‘º´S1j3Œ¶†^#«¬¡ _üò¶r†IXÁÓ§½æ.$ãøöQŠñõU¨Û§&}êèóVMÀø@cª½ÞyN‰#@Mfµ^¦o@êêcíþDù%]ó£,õ4Sëpký®¹÷–¯+à-Ù>{¨®Hz èL~¯!·Ðkx­BônYÈ:Ôžé軽ŽÐcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy4subsubCACert.crt000066400000000000000000000016501274666402600324000ustar00rootroot000000000000000‚¤0‚Œ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy4 subCA0 100101083000Z 301231083000Z0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy4 subsubCA0‚"0  *†H†÷ ‚0‚ ‚Êoe|”O\w#Îòyb}ËX”ÍÒ÷‘¨VgóÑõ$÷càÉKgaf€àÍòwoàº.HßÎvhk)ˆÏ;–¨ñfOpI˜]¬Ð‚ÕÒQ¹Ÿþ{¸2ïó)L£àë[¾Àv“Ë€0Õ¼>µÓêê‚”W ÙQ?Mê¤)` .ïlý˱1Š­[Á/ä¢Aå%z=0Œ{rvôÒÜÝL}Xou£¦Ô¬¶ë¨¹ ¹sÒ]©g°Î¹˜@ ˜F‹ß‘¨ê˜rQÌšCkgj‚Õæ"è ”Çrx±¾Ný¦yñ±œ*-‚"h”`Ò·(¡+|±f:üš6XüB!áÓû˜·nü'£|0z0U#0€}ï”»ö§—æØ"HCH¬³îº0U©êæÓž° —¯çþ.2¡gL†0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ª–¿íe§˜ø7ݯò`X5ñõÄ–† jˆóáåGíÓ@Œˆ±ÈÍ¥±ðÊêvet“ ÒlAÈöUw;d¼q.¸ðRŸ/FBþ hvX²U¦·«Êš I–h6/IÏmú¢Ú¦~â.øc¢Nœ’L·aˆt…Šˆ˜ø¤ŸIëÿ,uíWû^ ò?ÒzƒßtiÿîÐLàÊ|N ÄVŽº<`Hôãá#;Üæ:&¥?™ãI_Ÿæj†LMÌm¢ãæšEmwEnvlìçÛÙ˜T4` "Ådª›LPÆö1&tvMjÏý!rOí³œÂá”–4jòNüÍu¦ƒñcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy4subsubsubCACert.crt000066400000000000000000000016561274666402600331200ustar00rootroot000000000000000‚ª0‚’ 0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy4 subsubCA0 100101083000Z 301231083000Z0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy4 subsubsubCA0‚"0  *†H†÷ ‚0‚ ‚ÙÓÄ¿¨ÀBªŽtv5óéó„æa¢`äCÊésü*¨Ä¤ù·3sü»SA¦ße3˜‹ YŸ·ÜuHòÒÒÏ£Š‘€TKŽPÉÔ§T7:_}ƒvÉ çuOd<dFYû ¾än=€MŸYßcÝ¢,E‚³™åÉítYD  ­H²‰ºy˜É¿å²^Ë&°Ì?—ŸÑÛ´¹ö±\4k£|0z0U#0€©êæÓž° —¯çþ.2¡gL†0U»Ñ&ôž<‹ÏÙ{²,Ü£!0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚xMÏ£þ[ÌZreª°¦5†Æ´È}§Ðh0p¢eÆ3PŸêU>À©E¼ÙY]®N‚¨zRQ "ÃZ¿ù`xuÍê¥2øè|ñ†–¡g«wáõ” Ó‡ËÚ†‘sà O`oE^×õX<ÔhÙvî¼€2 ¾“SzëÊ¿w7z!8Z8‹÷‡4l Ÿ&½Ú ¿üÙŒ$ÿ´¼ó¯V¶‘À‰v¨y~fÈ¥kžÒDbTÙà&Êl^ë*L¹>‰ÿ ÃÈŸ´l€è(}ò?nÄÜ´0-¦ ]³ót^^ê-Ìñ¥\¬­¨fœ¤¸cN"ÌÔfï-,certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy5CACert.crt000066400000000000000000000016451274666402600311610ustar00rootroot000000000000000‚¡0‚‰ +0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy5 CA0‚"0  *†H†÷ ‚0‚ ‚×ë†!Ð}ºÔ½Þ´Ëy½tq,ÎÎ4Þàñ†5ÇóÆ¢IÈýjtî~ÖÀ‡C3ŠìôGân®/J0 ¼RômÖcO¨Ä"Ž0|€$?ÀSÞ©Moñ­—ãc¢_{´ àŦ«Ë,pÏ1ˆ¹ÂÒ ‘õ¤œ+U+¯‡ÑqÅð¢ðS ØýDqÙ¡t×¹”Îf?¸£ƒl3v¸<葱µxˆ­à1ÓÝúóϦ#w¢Vt}àQƒ"þ@99B\µ#–å_ßG/Û/ÓQ™H5œLŽrß¹pd ©Òª¸ýșʊÄÑÈ»gílÅwîozfzðòa¿©bzÜÉ£Ž0‹0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0U»‘ƒ«®®Þ\Øàò<\úŸ.á9h0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚x– ÷ˆÝ4 T¿Ä®Ø»ÆÎÄ6ÏæÏ(°ÜbÉ€µW¦eH€—µ…T…6áA^V¥7ÓŸêq-m²v9#þiƒ* fQ˜v[16½ÀÁ%S¥k&J÷¸æOie˜]FÚfÖŽK]¾Oy>%P±¨jÊ€¶ÕÂ^ÍŽÏÖ‘{ôÔ VÓ<Í‹}l‚|GÑø‹ûÐæ&ŽÏÂå¿pÉAµY…ëB¶yÅH*¡è‚£¼pÿð7þ½5’êëaWOit^èP%eÖ~g–¡ù’ÖBûïDïx7âò²Ž‚#=§ Èh¬6g¥4œûïôæ¿}ÊòqA¼'ûHm9ÚˆB3>écertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy5subCACert.crt000066400000000000000000000016421274666402600316700ustar00rootroot000000000000000‚ž0‚† 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy5 CA0 100101083000Z 301231083000Z0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy5 subCA0‚"0  *†H†÷ ‚0‚ ‚Ó$Eˆü\ ®r123ñÇdZaiö3—¨lWè¾~¤?-¥Æ,Lai7pXܾÿ ÚQAâŠ]_ÒBɰ¶‘/|õ½x¬ØÆH°²à5˜ªx¼'¡ö3º¡§ÊÉ. ç‡ö}xüä¥=òAIUkGŒã”45¾-A5V¿9ߥ¦P¢l«áž)Ì„ä,okܒâ®Lc²=&EGáydZ©æDHg»Ú´ÏоøðƒªD¦¨dóáÜŠG!’Û‡x]IèÕ ßÛ50è$zKŠÎЉ ©ž·‘Ð&íy³ˆì.í£|0z0U#0€»‘ƒ«®®Þ\Øàò<\úŸ.á9h0U7Ó¿ÞÜPǯȊ蒰ÄHað:0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚ƧŒ‹JzAÂÝ0œÕ VL7“²¹øn¥xVñlÁÒüSYøPßgxúœQ‹ëŒÞSz‚÷Ío)íÌï«fÁòÕƒFOoøåÝÒäþO~$» n-gĉŸgÅO—-ciÞêyÁ}Ø]ˆôVê›ÅÓÇá M­oæ‚—$†)³æ€8r‰M©Ô{&ÉÑ'Eqp B]ªxz r—ƒ——ЉŽVêo,è…âŽÉ'ÿŠ| L]V¾ŸqæâKí~˜^¡ÞÝhƒ|ý´È¾i1 µ/7Êæ;=B:3~—%id&æH*<Âw q=4G`uÓ$œDYõ$ZŽY§o$ïcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy5subsubCACert.crt000066400000000000000000000016501274666402600324010ustar00rootroot000000000000000‚¤0‚Œ 0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy5 subCA0 100101083000Z 301231083000Z0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy5 subsubCA0‚"0  *†H†÷ ‚0‚ ‚æ‹#Ò“ìAÞÕ´ñö¯|dËç ¶iT*V¿¿bT{/áo5 r€)á„gå5q/K\iFUAúh|$ü«ÛmƒØ¸©Uœ"êá|¡ì½€.«6>áCkžPÏÙ#¯‹X¯äWÄwËdË^[Ä+8ïÕæ¶ðÖïK_‰d@K 8çgRXODrbµè@ÄL¦ ø",£Ïô? ådÚ®ñòbo£õQYBžÄ9çªûqŽ n58OKߦ6ãúÿ˜ 1†û}‚Á”´Ó:!CíJ n$W€uædWÿÖxŒ‰UÖU£|0z0U#0€7Ó¿ÞÜPǯȊ蒰ÄHað:0Uø‚/yÿ´~Û[¯2ä5aµl0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚7¶L¸Rëcû±¿kSj­˜*y$“ß=ÖXa•0F%Dš—à…«…ýŒCLkÝ?¾tá&Ƹp0ØéeÒXOš™àŸî^•éeÝCçe‡¾L_ùQdªÜ“Ÿð>€Q>ÿAl£·‹¼ŽÂ݉KðiW)_]ÇúÁ95ߥå2ÿm*Ý·–µjªÍÖ»ŒØÃ¯¡P_"¿íCE²Ãß5f®½Ì%½¾ mö [ñº;z¼n£Lm…Þñt@€fÔ˜"œ&„¢Rf3¾H;ƒÃÚ-†M´x¯e¼³èìô¸ëÉv’ ‚£ ¦«$®r„®—ªÍCú¢®öçcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy5subsubsubCACert.crt000066400000000000000000000016561274666402600331210ustar00rootroot000000000000000‚ª0‚’ 0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy5 subsubCA0 100101083000Z 301231083000Z0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy5 subsubsubCA0‚"0  *†H†÷ ‚0‚ ‚•7õ{ f!àù‰ùP÷O·g¸˜úR‰÷XÁH„³äáÂЯ®åá8ód(`æ‰5®üF³—þ‹l½µ0Ì}žšdÙa_ÊÅž`,ôªû˜ER-±Íîõê¼ ‹oÐÒWÖò¨Æ; 8=0ïÀJt‡¡q=Öê´c’TÜN3 ÐÐr#!é Æ,ÃçhftôI~Ø_¶žj› ”6SÃmIm-'r»÷Ÿ…ûYpOO½¹»îÕZ<'Ù “3uÖìF½8»Ø—Оמó1ƒÓëWÜpTS*Êš2™#¨Iê½­Yhä[;eáiÿ-Äé:É jÓL}ÓoGÛ¦GÀ~3£|0z0U#0€ø‚/yÿ´~Û[¯2ä5aµl0Uúbº½~^_ߺ¾y7‚Üü(0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚Ât| y‘˜TU 7»ÂÓkuM1Ú3b3Â9dž‘t.!䘺,øN¬Òe‰¼æT*0 Ze8§âî6_ øBNi~®¡÷,¬cxds(†YOXèŸNàéhB JÁÑCLiÛx)>yÏ VQØw½6{]=×®`ïD•bæc6ìr£ø5ÈæÛ²¤/-à«>ItŒ­K€`*+Ý LMb[bÿ/µE¼úX?rzy¹†Ž‘\!ªõònNãÔÓhÔ {(‡ÂeoÄ^ˆ5ŸùKt83ˆ˜÷±Œz—lÑ÷“-ÍÇQD©gÈMãcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy7CACert.crt000066400000000000000000000016451274666402600311630ustar00rootroot000000000000000‚¡0‚‰ .0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor0 100101083000Z 301231083000Z0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy7 CA0‚"0  *†H†÷ ‚0‚ ‚©TªG0ƒ™*Ñ¡Š…!€µ“]ö‹[gòEhO,âø-¡ÊÒÁT¼ŸˆP¡·Í1I¨¹ ø8«äI›w¯ƒ"¼4’ÿ;žÛ Þ#L5 ^°;[g‹œ… ‘ˆOb0‰Cu¬c»zSâXÐ\ÄzÞôªq6OÈ«hû¿–õ¿E«Y(^Åýà}ƒµ‚&lÑ-ߣâ2»eÛa¹ËGÝág8²ÑظªzýSkìzF%¿\²2ûTª´*:o Kî5çÐdég=Žäûû'œ^ëÙÖûÛ”-À¦bP®{–wfõäFÿê©ç ö¢20›+‚Œn¡V÷£Ž0‹0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0Ul1—5 ÞÛ5å iXYˆdÌ!ÎJ0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚t)‹“\U©>Ĉgø÷È]t7×c–)ªfêÁ Ï1¯3«®ÆTbØq(ù<hÝ.ÜnjÝë“í´¢{míÌZO5è¹ÝÖ/ºùÖŠÞ'ˆnûÛ!?¬ñ™ '€yQ1f÷*á$qçð”²4£E{}ßuœPÍ ¹Ñ4®NîÖ°ƒ¡å ºÿ…³ï;Bì¶Ég 3pj/L}.éÈSI¹½ØèØ0²/PÒ›I§"ÃúØ-a.W[•È=æ ï¸kcˆ'P|Pä‹üZIf{º¤‰„ ¥ 0æm†]Ò2Ž`ÿÄ•ÍeÿMvQû¹>0i*%É¡ñ®NJûœÌ¸, ¡fcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy7subCARE2Cert.crt000066400000000000000000000016701274666402600322040ustar00rootroot000000000000000‚´0‚œ 0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy7 CA0 100101083000Z 301231083000Z0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy7 subCARE20‚"0  *†H†÷ ‚0‚ ‚¬Ð‚‡ÎÛd³¾a'L.÷×$}¦z;Eó€°Bšˆú6‰ëÁiÙP^\¢×Ew*Y¾Yžä—¯vc IÑàQ«ý†ÕÏu k’1ÒëãßzT‰›è{ÂLÕ&„"N™'¨Ymd=|¾ñ°,»3ku˜ùŸݢÛtÛšLBÓI€:žŒÐôíåª:þ¯{ðŠßÝšÒ+Ñ™ô¹è¥p\ƒ½q3 MË‚óˆ)o0TiKÌÃÎTVºÈ:âð+wÜàRÓ¢Ì7žåj·KøG5¶ú§Jæ ÁÍò7rÄîÞÈáÛt +å(•#“ap/9šøgð¢ö“Õ£Ž0‹0U#0€l1—5 ÞÛ5å iXYˆdÌ!ÎJ0Uç\%Ž~ªLwƒ{ÃêiÖÇ¢4á4Y0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚¢IëË+k¢Œ³Ë¾»,u{ÁÑ^þ+°ƒ=½Îøçês±TÿÅPд ¯¬t¤Y0b. ˜¥I@Û¸OÖ÷ïÛY8}QxGe½ºú<¤¬"ÍùýÃÄ«ó{µkoÕˆb•Àõ?äÙ!K`°êÞ³¸Ô2è;[w»¯c‚-L¦F¼ëü“ÖörÒÖ/¯ã7ž_±Œ^5¿5—cóÛNuž‹\¶ÆÃ?¢ ЩS=ˆHçdv[Î#"ñCà—QÝcnBoN[v@ „2Æ>œ‘;ÎÆWÐ [Â7‘tã)z˜@ONS×ïÞ£ªÌ¹`Bcertvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt000066400000000000000000000017041274666402600332270ustar00rootroot000000000000000‚À0‚¨ 0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy7 subCARE20 100101083000Z 301231083000Z0^1 0 UUS10U Test Certificates 20111.0,U%requireExplicitPolicy7 subsubCARE2RE40‚"0  *†H†÷ ‚0‚ ‚°¢óªáµ[`íÓ‰®³×²ì+¡b\'Ú¸]Ê*<=`nÝ‹xü¬KP0ç9Ê+aßw!ÂqÉ˱ɜøô“e€-Ç(œ¢fÛ`d{Óu6ÂÅ–EOäµÙF€,bçᘣN"…nGà¨qî—/^¯(fÂãmf¼ÁM5÷™Ç'y¨ „`§ú÷þw¼¨Ã•ÀÂi”®3à/Þ½q篕¦äèß°®_)Tq/ï{£Ž0‹0U#0€ç\%Ž~ªLwƒ{ÃêiÖÇ¢4á4Y0Unÿ‹fþ›¥{ûd3eê•H”˜0Uÿ0U 00  `†He00Uÿ0ÿ0U$ÿ0€0  *†H†÷  ‚ôCýJßølw£é1¤jé˜ã°X:D{qŠ]ç,¢ÖÖGI\´,@餺ƒ”ãÑböb¥ù¶µ¯Çäqð ×ã&îúºP@]Ñ/ð-™Ý0Ÿ×Žüéj_èê+£¨$Y–ZïHXEÃ~Cók8O°2€›‚8ó‘(ê+ Z´<ÁÁšðËœ9Ê2šh[ÏðAd·|ÄcÖw DDcþ“-è›æœ‡Ô¦µ»tú+Ô³_´å á]ß›rTÅ:óØ\©¸Ðt8É0F[ËEt'“_ݯgÚ:å¯*C°ø)È•¬ôÑq¿Æ(©g6>aw(lè=¤ŒÏΆÛ®certvalidator-0.11.1/tests/fixtures/nist_pkits/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt000066400000000000000000000016721274666402600337450ustar00rootroot000000000000000‚¶0‚ž 0  *†H†÷  0^1 0 UUS10U Test Certificates 20111.0,U%requireExplicitPolicy7 subsubCARE2RE40 100101083000Z 301231083000Z0a1 0 UUS10U Test Certificates 2011110/U(requireExplicitPolicy7 subsubsubCARE2RE40‚"0  *†H†÷ ‚0‚ ‚»¨ZÈ-”Ѐú°‰Xü¼b}•î;XH>íð¤pL›Ëˆ®}1‹÷=<Ø~¥\Æ f_o·ý8O±^YñKơϠ;’›’ø¸¶·ó“ ˜ª/¹`:3 þ'5R Ø{îž}záàµq”œ1-àÈ^¢u¶&2Ρ¬¤µÔoâ¦[ª @É«²Ü– ;å‚VbÙ§Ÿ1j(_ðñSSœ%®­“·Zuxh¥Ê ¤Î— žaÙ*@˜HÏ+Æ£”–H ¤"µô}2¡ÌÞ&çøå æ•Cf™s`Ï<¾$«@Aßñ]I’,Õƒ>†xRt&Eû?b_ñZ’0‡£|0z0U#0€nÿ‹fþ›¥{ûd3eê•H”˜0U{,Qa1­¬,k©¾;;’ªD0Uÿ0U 00  `†He00Uÿ0ÿ0  *†H†÷  ‚œ™ osmó±žV±¡ºŠ×1Vk â…Z9LÂÂæœìäÅr" ÚÛ6°ÀçOœ®¥q6}7V^œh ‘”‚¤W}m@;¾ß‰/ú|·#ÿm}Fóñ2dCÀ~¹R‰uC-SÚÐpþc·‚06RìóôhjSù%¦·F‘¡¥u[ª 1Ïn%öÇ-–…èX¤ªó×'æ—ò¼*×óèW³7ÇÇ ŒôÍÎÉ^{¼˜ÓyaR½Â¾”€U~i·±ªÕ eQóÑcç¯ÚCÏØüÊ/kɤƒq "c0솃ÃÊ?˜lÚ¤g~[ìÈ€½ýËíl‚šÊ‡» =ˆs¦certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/000077500000000000000000000000001274666402600226175ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BadCRLIssuerNameCACRL.crl000066400000000000000000000007201274666402600271100ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UIncorrect CRL Issuer Name 100101083000Z 301231083000Z /0-0U#0€rò5]ÕJ A(ý”pq0 U0  *†H†÷  ‚‚$ÿî¾v¢ÿ"¦)€ÚVáÿ"Ödî.WYº9„R­×Úñª˜r „†ˆ!~:åP¤c¶,×WVç«& ”5š‰$J»¤Ñ†e4øsM ™šlÇϹ%ZLÍScx ,ÚúÇQ»uyføZhú¯ßK9ÁVÁ…(-§Å$pb]Çw-0EÉ’âʪm±½<2Î_ÔEÀØŸ­Y9§íœ@ Ú„®Î‘”×s´¿£þ¢KSnUµöBD¾x}ýö1âáeDû<gl…5Ž'‹0Äȹ.Ü A÷;?-oQ¨î>*†+ý½®(výD5¬eú•(D>ÔŸ<×certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BadCRLSignatureCACRL.crl000066400000000000000000000007131274666402600270000ustar00rootroot000000000000000‚Ç0°0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UBad CRL Signature CA 100101083000Z 301231083000Z /0-0U#0€1‹5žDa0Þç .H$Ûù½0 U0  *†H†÷  ‚l=ð!ÊŒ#és&f7÷¤ÈÂ}®l ‚oyS½v‹°ÓF®1Œ‰æÀ8¶Í.¤¶+ÍÛzÜæ³ñHêžZÃ_\pò¯þïàû BÊØì¨^B™Ùun!2šÿ•¦Ýa«åCà3Ùî «2rquüÞ¬¦ø¬ÄÈÚ‚Z0v³ž3áÄ ð8á@†`©ú8ávaªÖöñ,ó*TA³µ†‹Óõxo­’ŽŠ[XÆß9ð=8ñ‰ˆ@5°ëÔK*tËüçgQxŸ¡#I ’·}óÓHn@qT›¨þcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BadSignedCACRL.crl000066400000000000000000000007041274666402600257070ustar00rootroot000000000000000‚À0©0  *†H†÷  0F1 0 UUS10U Test Certificates 201110U Bad Signed CA 100101083000Z 301231083000Z /0-0U#0€{Ý;JàÈÝD…Nˆ¼žû¡òY¡/K•þæÞV¸†@0 U0  *†H†÷  ‚œÞ‡ß˜ .óc]Ïè…ŒS-Y°ˆÈ´Ñb©¼â5rÒa¶×2’lùýß¡ê$ ÂA¡jºÿdy„³ÚÍïŸ>–ƒõ?Tvï"r· FÓÓàS²ÝbÖDÅ YW¹BÜ“k‡ Gµ³óÈ×÷)àž1@`­N:œa*û6äµÌö±ÍØ/5œ±¾[HRÞ³º9@Ä7÷À’½©l™JÞÎF†üEV€%vP´«%[a×н<Õ%«XØ휈…X ­#{?Œ‹Ë,ÕùÉEU !óYŽXGõÉþ.V!$«,¼=7™Y)N6–GÅ­Â/ÂU/™GNúv5certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BasicSelfIssuedCRLSigningKeyCACRL.crl000066400000000000000000000007771274666402600314420ustar00rootroot000000000000000‚û0ä0  *†H†÷  0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  /0-0U#0€$ÁUqúžá!…*ð­a§¹ÕMC0 U0  *†H†÷  ‚ˆ?ó˜̃=M…q|`s°jùmV~°)nËœðÄds–’WŒ•œ¶b~gZVRÿ+ÆŽ[æúG‹ç75FÆ*r@»~[ºž8¯«€®¶ª–z¶œkMˆ^E‹6AUÌîõˬyXiÂÆŒ‹bøµÝòÝòÒŽ Á1—/À {ÐÝX…ö¬Õp ¯Ø~|‡hçä’ ÅeïlnJ‘ ÛZßóŠžT¹{¶8)nHëšÙåøˆù5¨ÛúéŒ_z¸‘°ðÔ@ØÚŽðļR©é¹™•בçÜ'‘&ï+Åì«m nZ…/kÝpÏÉ'­krãÕe:‚…ðòi ¿®certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl000066400000000000000000000011521274666402600324010ustar00rootroot000000000000000‚f0‚N0  *†H†÷  0]1 0 UUS10U Test Certificates 20111-0+U$Basic Self-Issued CRL Signing Key CA 100101083000Z 301231083000Z ¼0¹0U#0€)šE.6•ìò^TœÕÙöD‘,0‰Uÿ0} { y¤w0u1 0 UUS10U Test Certificates 20111E0CUÄY;Ÿ‚‚a$`lÞ¢ž8Ã6ç.FõXù°óF—n§xN¿SÔôÜR{Áym3PQ\[’㪼B%Ux Àׇàúã<¸E„óõΜ÷ªB}oÚ(t,Εeî/qÐÈcP–¸ò™yíaöÒ@Ñï1l=o§·AÚu²jŒœ¸~‘¤ þÙkT­ R£›tþ8HHúCZØFRd¸Ÿ×&„'='zžÝú,t…¾h© ‡‹÷üZ7·Î#;†’|Äßêuôäü¼Øo§¹‘ ÊY§3í›K(ãÁj1certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BasicSelfIssuedNewKeyCACRL.crl000066400000000000000000000007671274666402600302330ustar00rootroot000000000000000‚ó0Ü0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued New Key CA 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  /0-0U#0€ üÀ,ëUî’l©é__¢Ÿb#•0 U0  *†H†÷  ‚p.{CõÃÕ`·ù¯†'^z"åÚéæ|´$ ˆç–^]ancq*ì„,ttLæèlñ5É"¸p¹/‡ÔšÆFj€”çXnF—w6×ÕÌ“Š4´#S7惓›à–Æ.šÀÝšÙ—Íʸî­ÖemœÁl½^É̱e…›ŸüÈ%ˆâœó Ö´7Û¦E:sSô—fÏÎùƒŠ²¬#ØŒ"nFЊfÈK uoøâŒó‚ +¢nR°|Ù‡`È÷CrÈšBoyA…Õß3"x¿)õôŒûm?&%P Çb´S©Üàà¢ÿüïB O§ œùÓ–RÕÿéVÛ0pøcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BasicSelfIssuedOldKeyCACRL.crl000066400000000000000000000007671274666402600302200ustar00rootroot000000000000000‚ó0Ü0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  /0-0U#0€ˆ_¾?59fšëMÂ&&±*'µ*0 U0  *†H†÷  ‚²OŒà\¾³Iy®[M×iD~Þµ[<R7oQ'Ÿ² ùÌ„ˆ0 ƼÏB*œ÷O0û<ØT›yR›ºÓÏŽÎ"Ìo0xð>NF™cÊ£:Ùgq%Чuô¬u…î²9ϤvzŠ¦ê¬²ÿ¬¤¾×Ýn4>z•ÜnÜ1 ŠÃ(ÝžïOîiʃ@ñJmÆ™x&=A¾Á¾¾µ‡ø|D“0?KÛr¢6-õK½‹›ÝhSª¤zæ†Ç¬û ~¿Öû\µ½ •c¶ÕŽ’ôb¡8ÙevÖ”±õ—³~|ýœ—ª  HF¬+œmLÎzÝ٬ⰶ3certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/BasicSelfIssuedOldKeySelfIssuedCertCRL.crl000066400000000000000000000011321274666402600326040ustar00rootroot000000000000000‚V0‚>0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UBasic Self-Issued Old Key CA 100101083000Z 301231083000Z ´0±0U#0€Ý uShÄË@À†0¡¾¯0Uÿw0u s q¤o0m1 0 UUS10U Test Certificates 20111=0;U4Self-Issued Cert DP for Basic Self-Issued Old Key CA0 U0  *†H†÷  ‚À €ˆ¶;4}Xï›4ÁOCÝVuý”Ü£ ‰f> ý!+/9e ^ÎXcñÅ{0´Ÿ»Ñĺ|×!wvÙ®qNQ¥pÍ(¬M–!°Ú ›$pù£Âo£ Eð…^Š`~úÛï±'AÓ’À§ÒiT•­Y>`p ˆêŽÎB'º[TGN)2wÁ«_g ~/Õæ~?Ïñ¯L Ý`ä³Û—…aþ ±Ð=ï.\=BÖԃߗAè­' ‘™¤Llñ|ž c§íR`“3µ^Œ{JX=¥à£¾NHÄ3ÓÆÓáß«×ŽQÐ;ŠïèÏÄnŒ)˜I™åR‰`ýKÝxcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/DSACACRL.crl000066400000000000000000000003411274666402600244730ustar00rootroot000000000000000Þ0ž0 *†HÎ80?1 0 UUS10U Test Certificates 201110 UDSA CA 100101083000Z 301231083000Z /0-0U#0€ÆŒtè{ ÈYÇ}<[TY`% ±0 U0 *†HÎ800-2—œ’ní–¥p‡?½¨Ñ'jtË ®ºïN  $"QO#ñžç±ãcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/DSAParametersInheritedCACRL.crl000066400000000000000000000003651274666402600303610ustar00rootroot000000000000000ò0³0 *†HÎ80T1 0 UUS10U Test Certificates 20111$0"UDSA Parameters Inherited CA 100101083000Z 301231083000Z /0-0U#0€eŸp:Œ­öCÈçUŽèKÛ‡â0 U0 *†HÎ8/0,<Ð]-*uLäDî±+ªÎ¡€‡<€,ßµ«r=ÌAY©)ÞdxÑÉp·”certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/GeneralizedTimeCRLnextUpdateCACRL.crl000066400000000000000000000007301274666402600315410ustar00rootroot000000000000000‚Ô0½0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UGenerizedTime CRL nextUpdate CA 100101083000Z20500101120100Z /0-0U#0€~*uï 6ÇKç ÙaHGŽƒ,0 U0  *†H†÷  ‚—ÿ@{¥b!ïoiœ%Ek6rµ>|ʾ"ÒrìXLêÒÖ£~LL5{I7)2 –xþ|=ð¦xSz­ÝŒòKì/u&K{c ¯€¯X¥›/¹’P¤åÂA‘>~IP¸M\bG`vò#ÙÞ,ÞJê>¯3) ]f¨©Òn=ûfq¸¸\ôÌBc1¸/¾{“sÃG ë´ø§b/Ñý÷ŽÖ( ÁAR©aßôÝrÅÉÔËʲ!Ù3sÛÙˆ(‹™(Ëh4Mø—]¼zÑ éMg¸²“˜wÍ*Du^ù7ÝèÞÞ,B:û"vÓo¾8êÂúÃlÐÉ!03rcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/GoodCACRL.crl000066400000000000000000000010041274666402600247510ustar00rootroot000000000000000‚0é0  *†H†÷  0@1 0 UUS10U Test Certificates 201110UGood CA 100101083000Z 301231083000Z0D0  100101083000Z0 0 U 0  100101083001Z0 0 U  /0-0U#0€X„$¼+R”J=¥rQõ¯:É0 U0  *†H†÷  ‚=¼ó Š)ÃðnÅj„ì»ÄöJÓ‹S‹<|Jž¹A¬ÿxv¾Uu—ØähêÕÚMƒ6j ˆ3”>mJ íImÇåóolÀ¹ð ÙíþúNY2ԣϿéÜ2ž³Qïkúá&mã¥!¥+–zÖá¶«M“_8F†P”Í9¤ÀåNyþ,=¨Ç7G¿UÞÎzäæ…²މ«Ÿ¯íÊomx;/he9Û²õõ(÷4V2HP¢Š²Ëð®O1G•®‘aV/&äEæ¦Å­M’·"`­'uß°g_,BCg´õïPç ¼…K›«Øã…”˳êBI²HI0KãÓVDcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/GoodsubCACRL.crl000066400000000000000000000007011274666402600254660ustar00rootroot000000000000000‚½0¦0  *†H†÷  0C1 0 UUS10U Test Certificates 201110U Good subCA 100101083000Z 301231083000Z /0-0U#0€2,žt]-])»±z;R´}Bx0 U0  *†H†÷  ‚FÉ´38`GJnê#øP;GƒaR“;Št xÎ —ho‚2JIÔÕ$ %µìl­ta"éò[Ádõ­^ׯí¤5_r±H Ø>8OõelìÏ»o”¹‰ùì Ð×–ýz†FÖlѫܼ¹=òÄ­› ðsiIi¯2üêÖ›Ê>Àåï§—ìК>É®ñ¡kü“h¼dïäško­,T,Té¸=D$Ôd–o‚"S³æïféQv¢cðk`$•øÞÌsGÿ¾GRn<±kä¸ÿN›-Þÿ™u U6ór8J|lÕˆŠ›±ê$$êÛÜcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/GoodsubCAPanyPolicyMapping1to2CACRL.crl000066400000000000000000000007311274666402600317270ustar00rootroot000000000000000‚Õ0¾0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"Good subCA PanyPolicy Mapping 1to2 100101083000Z 301231083000Z /0-0U#0€[sy™ã®ÓЦ3Nxä ±äÉ0 U0  *†H†÷  ‚¢ŸL²ë†ù±ñb?çÜFx  …•HYv+-Çu¢•#¿:2'TpÀºo;êKçoîœúdR¤Údóî(µ¿sÙnìKE¢µaÎ@•€ï›œiË>¨*¯u´°ÿ6Ðx9×וìÏÔ³xˆüÈ|&Ÿd¿–Ò¢ ³}fŽæ¸ðÅ̽`ÌÇqÍTº§ú~ðÚ°ÐÉi÷D#n…­úð>ÒA Cc„+«JÚ›,§&$1ë!Râ¿Ú¹Úz}†±¼û•¶Xý36„¼¡übKµ’¾—¾kEfå_O6¼Úù—ãl@Rbc'òθ²6v»óÖ¶ûØcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/LongSerialNumberCACRL.crl000066400000000000000000000010031274666402600272700ustar00rootroot000000000000000‚ÿ0è0  *†H†÷  0N1 0 UUS10U Test Certificates 201110ULong Serial Number CA 100101083000Z 301231083000Z0503  100101083000Z0 0 U  /0-0U#0€ c·G®Â2oã:¸ê ÿ×d¤0 U0  *†H†÷  ‚÷ÂN‚»èâˆK¢e`Aì¶±.±‡†ï+ú™›/s35SÔ)K»ŽÕà"Gqw¹ÆÓê‡8c›•2Ãó9œÒ“®æÄFôнˆM6Þ» ‚Â’øxØHʉÂZö|ú$48\˜|ȲòIr/JEœÑ.Âc+u°'ü©Ö®ïÉž%Lh¡ƒbºèH*ÏB¥äö°“Ư°¤ñd7S%Ë‘\îÅgA¬Ô4 tx»Z>Ýï­k•ZÔe¤›ïP4òêfœ§»úV $<~H.¼¦Ïç®@°§žé0œ[;̉C”`è*¾;0w< $e‰ôßš sàH‡¢Ycertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/Mapping1to2CACRL.crl000066400000000000000000000007061274666402600261720ustar00rootroot000000000000000‚Â0«0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UMapping 1to2 CA 100101083000Z 301231083000Z /0-0U#0€™ÅxiË=3v™¬Då°þ¹ôÛÇ0 U0  *†H†÷  ‚0MbRžV»Ð¡Opt¸fhˆú“EÐt;ðI]Ž}ŸÃ_ Ë(2[ª|<ÈŠGë½Ï*W¯˜loËч™»<ڱ뛆X=À‘ͬôaY»fÈù澚…VG`UñT‘ð¢Öæ|J‰þÖy‡+à"ËWíî&º{Éæ<í¢f OEö6ôSáÒ©)õ4j<ºXâ†0hl^õC ªõ]¢X©Et­‚7•”7-øÊ$¥‚û™ë@òË8¥Ÿ†¶3†õ9ΊØÅÍaÜï­"9¸‚?¨S‚ö£¬”}*>%j<Y=Åñ.ºÙ~u£ &uJÖÒcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/MappingFromanyPolicyCACRL.crl000066400000000000000000000007201274666402600301740ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UMapping From anyPolicy CA 100101083000Z 301231083000Z /0-0U#0€hsà 4Ïr@Ú”–Ö«z¤o.Œ0 U0  *†H†÷  ‚¦rˆ6ÌÖ9X™2Ñ‹«É}L—xsÝ‘âæØ¯ƒ»lTêÞ1Çol ƒ›åcçuÛߨ»Ð”•'Úóð…ž~[¦{¢Ô¢ya¨ZKåcü”üwø©;LjÿÛ·¦ÛV0Júéνx"Ss9ÖN¨«®#ü®uò9*8¥‚EçoY½Y¥c;WŠ@!ˆ˜Æë9È;8€ƒŽÿ!г¶æñµl-WÈæwüâäO´ïåqrÊj63ç0½  ðºõqTô¸6›ôƒjÖ‚ÖiÖ ¡®¥®ƒÊ…Ó'…2þtÙ’¼%'³­p@=M‚fˆ¾¥ Sé3Ôýcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/MappingToanyPolicyCACRL.crl000066400000000000000000000007161274666402600276600ustar00rootroot000000000000000‚Ê0³0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UMapping To anyPolicy CA 100101083000Z 301231083000Z /0-0U#0€,í“ñp”‹-“´˜Ò·¬0 U0  *†H†÷  ‚ u•›}Œ( Ü+’=Ô¸ï¼øˆ]°LÃ…qµ,ªk3tŒãþˆC™*,>&\¾•MíVÜëî俹É$«Ÿ9k;ÜÌ%õ‰¥Ç¿Ì¨]µ¡ROW|D*Æcq¢šQ¶Mn‚jq³RßôÅ«¼8Åæcù.K$â2§•«HåxõK Zë-†¨¼¤ôœo»˜ßÚ|O¤É Wi;Ûl©íü+ÇPpiÔJ=¯Ç"³(Ô¼ÀV#–ºîkÝên™ÎftÚäPr àSªùm¦Ô¨±ŸÉó˘®o H j©}7÷u"ÎÈ:O釢fxŠÊkÑcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/MissingbasicConstraintsCACRL.crl000066400000000000000000000007221274666402600307320ustar00rootroot000000000000000‚Î0·0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UMissing basicConstraints CA 100101083000Z 301231083000Z /0-0U#0€0V¼OÆ&Ƶœ¡p’ÒùO y0 U0  *†H†÷  ‚ Òu{uþ¶~%í–$ìÌ"‰gY¦¹XÉê‡ïËÿøú¾{dµB7ÎßÑùñ!¤Ù»6©;¶B̵\‘S]œ‹_:ˆ¼>”Á±NÇ¥úÇÒc¾WïÌ9}ä}ÈæZîéÊ †]ew¥âdiW_Ãú³‘ÿÝj3i®AîÊ &ÿ,'åÀŒRhvZèº)!v™ƒ„6"^Û£d.  ¸Jj­ËcÈ#¤›VíÑ,ìt(ßsž ‹6»Ä:OJIn—‹ºÆºe]9%oCޱ ꫆•ƒBÓAÒ²ñ¸=ÿ¶ ò”ƒú#DØ 'f§é¬ƒÆ¢MÒË«_'certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/NameOrderCACRL.crl000066400000000000000000000010221274666402600257350ustar00rootroot000000000000000‚0÷0  *†H†÷  0“1 0 UUS10U Test Certificates 20111#0!U Organizational Unit Name 11#0!U Organizational Unit Name 210UName Ordering CA 100101083000Z 301231083000Z /0-0U#0€¿J‹›MŒ1Œ[éÌÝ/èyQP0 U0  *†H†÷  ‚2iÄ2 å†KØ­Ñþ·ïo;б "â^Z›ý2Å×±–_7ÿÔxçð!ÙáÄÇQž°ð HÜ™ö[q«+Uð^ñ©H”¥„pê Ò8ì&†…?€(càF“Ÿø ¼#ØÌÍÈ׿Ê<ø? ¸OBî£3ëGv•œË…e³çHΚü/Ë[9Æ0‡Tf,Ê)Ìh÷’ÂP±N²è,¨{ªÜ¯©‹²“JÙE‘ºÎUr=€.£yøbæÀù°™‰§ŠKP3Ê?ˈÐÈmt®çì ]Æ’s ãííQïó=’¶Ï™Wù0²±¿®[F?ÖÂWûcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/NegativeSerialNumberCACRL.crl000066400000000000000000000007641274666402600301500ustar00rootroot000000000000000‚ð0Ù0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UNegative Serial Number CA 100101083000Z 301231083000Z0"0 ÿ 100101083000Z0 0 U  /0-0U#0€bä.5ÆÅè‘Ð ÁÞ¶¯ÚˆÙ?0 U0  *†H†÷  ‚äAV Î"f½(`­×yÌŽ €åHô¡¯ëà¬aABœ¢üWYM2¢ßwÓ®?•‡ƒ4¼ܯ\òAʆOø[˜Ñ¿óÁ/»fu.-<êù&ßè¶¡~ é’÷_é(ÌÃ..v½ íÕNŒt ô3>8£î×5çJ:?G½ûí‚•îDÔ `¤jÞ©ø*0jõŠaKó)PF;Òh¿—M¼¯¶/7cÉϪµHÏuQpnÆ,p&a½Üÿó3KòZN‡3”2„ð7äÜEkÌ•…˜£'Úhl@ø 7ÁÃì xG/ò^çã®h†¨¯Gè”e>*êGW„ÛS([áW!!Vü÷ certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/NoPoliciesCACRL.crl000066400000000000000000000007051274666402600261340ustar00rootroot000000000000000‚Á0ª0  *†H†÷  0G1 0 UUS10U Test Certificates 201110UNo Policies CA 100101083000Z 301231083000Z /0-0U#0€B$í¥Kvœ—˜\tê:ü5äœ0 U0  *†H†÷  ‚n±¡·‡Ë4ý÷ºÂZÕ›]_GO¬à}O@Q5ö¤: bñd-¢f­)®{¢ å÷ÅØK݀Ēæ1ENÌlÃ&iW âIÇmhQÆð·:f¨tf×\·C9a)O¨dè £îÐ@ äǷ§ƭM-ämõÅéÎÕÿP_âî¶ÊQ諨Õà¢åZK DÜ?Ú(¿O3ÏݲJøgð›Ä_½â«¤£Fö=ž|ÝþáƒHÄw_Òf¬Æ¶déÃM1ƒ`ð—ñ{ÝÍ%)ýpVˆž—)um#ÂN'æÓ?)&¿ND>×6xË?žý<቙…Mú7¾ÀÓ*‹Mz·“¬vµ³ØÒÁKåÎ8?¢n§ÐCZu“œAçÚÆ‘^·’ê>ã,¦–Á.X&!JxÕ³¢[1hiŒlݤù¾þfT"™Ê| [,"rÜÍÀÐåI÷ÛÓ€ÏÍç®BeÆ$Ô:§ízÎì9ä§xÈ­MU;,ÀN9¿3PàKà­Ìd|©Ñêcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/OldCRLnextUpdateCACRL.crl000066400000000000000000000007141274666402600272110ustar00rootroot000000000000000‚È0±0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UOld CRL nextUpdate CA 100101083000Z 100102083000Z /0-0U#0€ÎÚÚZÌŽ—ú )O¬–*Íx0 U0  *†H†÷  ‚4´ãµ"õCvÛׇ!EÙDµÃEä#)!LoKw1ôGgÂâf_˜{!àz´[5{š€¯:^²Ó=sÊ”4㋤certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/P12Mapping1to3CACRL.crl000066400000000000000000000007121274666402600264530ustar00rootroot000000000000000‚Æ0¯0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UP12 Mapping 1to3 CA 100101083000Z 301231083000Z /0-0U#0€üôa32€|}5‡Þ_RûiñÁ0 U0  *†H†÷  ‚5…ܼT+§š ëÿÛ =}(^…¡òN^ë8ÏŽîMÿ†÷O. ¥EaØÉ‡ŒéK¼¢“I¨¦§‡ª@mÌ¥NzGÂÄ)' Ašpû’yŸ•hŸ¬ÿÝ2&º½³ŸD7šà'„;Gi*ÔñK0dz1Žà f‰òÓ_Ám‹Œ“certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/P12Mapping1to3subCACRL.crl000066400000000000000000000007151274666402600271700ustar00rootroot000000000000000‚É0²0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UP12 Mapping 1to3 subCA 100101083000Z 301231083000Z /0-0U#0€¾{“¡ä›Å'<0SץɿZ–z40 U0  *†H†÷  ‚²Ñà xÙòÚ“Â!¾+,«ÕFÍt–ÌÆ¬ Vc†ë K#ÀÆZæ[S«¤ßØÀQd3”vç¢ÂÑ-¶äZ†· ëAéCÈ3&iФC@BKÔóÔ/?‘ü({ݘ8n p­vS?ÛãN<_ë•…Í’ß8õ3äÁ¿Þ!äž\&>CÓsæ$hÄBoçŸÓY®ÔA€ph6ÏÅÖþ·„…Ú6Qbæö.‘•g™4â3òyÀM`Ô,>%$fãD.ÙÄð©ôi9*¦ÄÒ¥;²˜ˆñ™Šà_£ØÌê{(OØ-–³’©r\“!\»viEÍô†½ÚUºZ²;ˆ~certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/P12Mapping1to3subsubCACRL.crl000066400000000000000000000007201274666402600276760ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UP12 Mapping 1to3 subsubCA 100101083000Z 301231083000Z /0-0U#0€]9>åª*^-ö®h*­3›=›s0 U0  *†H†÷  ‚«. [¶?õnå ÞDMß›{r­z L;°dBÛžÍ÷j20 à[zj‚˜HüÄݔ<ÓˆEii®$áJ¥q2 1Ù\ðÒÎΛàØÌnEÁ¦ëâ«ñ‡å´äž&Msu Þå__·¾“Hc™¨­â´ØF듊—·| QÛòM.‚cÎåtÌ|žp"hPÅš¡2ä@#€IöÝÀüÊø~ú>hÊwLáwšÀ… æK%dÂÀœúéa2mMo3ݪ$üN1kÃÅS'+fgÚ !IèN.²6‘2ï Xô$fÄÔ¡uHmà!®å7» Æ„ûÑùŸhcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/P1Mapping1to234CACRL.crl000066400000000000000000000007131274666402600265400ustar00rootroot000000000000000‚Ç0°0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UP1 Mapping 1to234 CA 100101083000Z 301231083000Z /0-0U#0€• ©IxªvÚ ¬ˆùõ÷G’0 U0  *†H†÷  ‚ªh!Uá4b// g«» ”¥ºÆÎMSíÂõѤÜ!Mžw5x¦ktc{@'$t…å©–ñ«§æý.TáŨ3­£“ƒók½ª$ÓN ­¥û¤O :– ÿ¢Ûi[Ùg`ŠG»ÖÂZ^ç¼ÅYÃ’;8²Ëú*’£µaK ÙÃ}„HÁñ·ðü)͆1W?‰6¥,7·9G,Hdë¨(4;œ‚v%Г“W­[À€G4 ³ ¦!5*Ãúœ‡Þc/:h¾U„Ì42•I1°{\'j¸qi*Uî¡ÇªÀ{TúÍÀÌ\GEpÛ¿ý1@«Ø×certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/P1Mapping1to234subCACRL.crl000066400000000000000000000007161274666402600272550ustar00rootroot000000000000000‚Ê0³0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UP1 Mapping 1to234 subCA 100101083000Z 301231083000Z /0-0U#0€å•ý*9x¯ËFö@˜e í»0 U0  *†H†÷  ‚ÂRoNµ/ëTeùé¡iF׊ŒAÇýiÂû“lu8 ÈÏ?6׿* ÷¬F³½B%²–¹acertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP1234CACRL.crl000066400000000000000000000007101274666402600262650ustar00rootroot000000000000000‚Ä0­0  *†H†÷  0J1 0 UUS10U Test Certificates 201110UPolicies P1234 CA 100101083000Z 301231083000Z /0-0U#0€öý©Œ&,´ÏÖÓëÔ­’j»$P0 U0  *†H†÷  ‚ÕW 6?\;Ÿ¸·». ¼?B“jJ"¢áù®÷Øw¡43¿˜|ÀpB£“ Üv$¸!Ȱ-Àø-<Ý@~ÕçæIUÀQ¸Òyȃœ,º}þh8¾f!“RF®Ìéf¿?{Ë%û»/KÉ­? ä|=6«.ÌZ¦Búå­s- ÐÎ[àèd %Ò+îà©8…‰d%}•¥dÊgÌÖ(tÁu›ËEV–ð+ĨYΖé׬uWù`&FÆó:„Jš…Ò wq>KB„/J/Bâz÷Z°1yüvyRpMçë˜ð ½žs~O›ež,ÙUo6538àcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP1234subCAP123CRL.crl000066400000000000000000000007171274666402600273540ustar00rootroot000000000000000‚Ë0´0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UPolicies P1234 subCAP123 100101083000Z 301231083000Z /0-0U#0€¹ªP¦4fQhBî)ˆjìÈ|÷0 U0  *†H†÷  ‚}]®ÈpŸ‚%ëÂMµB0ø˜ž^¬6AØwò3¡81°Á­¶¿{‹cºßc½&îíão šXIÂðP(~gÙ~ÃÞ B ÛpŽmÍ/õÊÏÚr½ `6è)Xí0 Û;HŒPÜKäµþÖe'¶ê)z”ãFøj[LsÑÜ»oü/`dÎ!½ Ó„GX+ør×AƒqbOÚÎâ"ƒ7D’YE%í÷º vïñÏΜŽÍCñ•²¤’JŽÕ9YIt¿SÒˆ¿:¥ñ^3›ÖëŒRÁîµ·LçR:VD$„(Ý799ƒ aÎ7šî­=6Ì= certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP1234subsubCAP123P12CRL.crl000066400000000000000000000007251274666402600303500ustar00rootroot000000000000000‚Ñ0º0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UPolicies P1234 subsubCAP123P12 100101083000Z 301231083000Z /0-0U#0€Nô^¡ù0{e¬’À ,Ó´–0 U0  *†H†÷  ‚;y”køsâïbwˆúÔ•®éÎ R_ÆÜ`T¯ÿDþÃ.ßO~¸Äj•8Ce࢔§r,ð×†Ä }©iù%Ô5 !om+UÆOÄL*ì]ö ¼­$‹ÄKdÎ9¼.ÏVðŠü²âg•»ŽØø³f&$wÒd>™ˆá {ÂòªÖFü?`1"°ñ†ÐCßÀµ 1÷5ü&굡ý°VÑ;µ¯·uq¨š¹#C "Ì诹½ås\öÝ‹Ð" )´«`Ú}(£ïíÉR;¾!…® 5]sò[‚ %9XÂ>‚í³D²“ñ áÙ9£I0œåp—‘^´°YysçoêRç„M7Bjžwšcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP123CACRL.crl000066400000000000000000000007071274666402600262070ustar00rootroot000000000000000‚Ã0¬0  *†H†÷  0I1 0 UUS10U Test Certificates 201110UPolicies P123 CA 100101083000Z 301231083000Z /0-0U#0€Œ( Ú bî==–¸q“‰êèc0 U0  *†H†÷  ‚_œ\fšíª Å|!)[þ:…¾9Báj9K¿ûÓ -È^µÛz‘ÝÑ9ý‹‰àTàš·¨8ÂjáDötÞCñ»ZzÈc­¯P­2YâÞL®8Ð¹×æ¯÷c÷I€uЄínÜUÛ-xöÓ{H‘—VFáìÿù¯¼#‹n!†Øò^€ 'Ð65 ·¼ààN)j¶ÛŒiW¯%±}-‡Û"Yü«uSO:œŠˆÞLÖVöÕßR„r…˜„ ¨™dd­ym³‘ºšIÐ+ÔÍp‰gøÕ.SÃ÷]å”ܳ’tÃŽç¡wí çä8t«IÎFØy_ëcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP123subCAP12CRL.crl000066400000000000000000000007151274666402600272030ustar00rootroot000000000000000‚É0²0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UPolicies P123 subCAP12 100101083000Z 301231083000Z /0-0U#0€ÎÚýª“@øÀ y­ÁxÎ×'öž0 U0  *†H†÷  ‚@^ Ôå‹Uå‘CsC,EßRð+ò+L½`0i.Þ©ƒ-!™ÞuèÔ tiºÇé~%‹ÿ ¿»£ßMÇtØ=‡®÷>Atþúr æ[·J‰ˆåWY]\RhØŸïosÀ&€bœÕmÄûßô(&ü„¦ÇK {8A)žrÃ-ºgtWP,±ÄFÍ8ï7FTédü¿£Ôê–)ép&¨-Tûü7-ºs3íÆ(joôór™$z|#RÎGa¬\‹Œ¦šWŠ‚òADð¯4«6”ÔL¤ø¨©Ì¥aã½$¸‹Lp9ÕÐåÎ>âQÕp7ÊKeM2ÜÛřՎ&Èôcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP123subsubCAP12P1CRL.crl000066400000000000000000000007221274666402600301140ustar00rootroot000000000000000‚Î0·0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UPolicies P123 subsubCAP12P1 100101083000Z 301231083000Z /0-0U#0€ä>F·æÈ©ØíÑ3áñ]$Â0 U0  *†H†÷  ‚f j…ã/Diþ0kuªôˆKgH™:á—ˆ%IŒyhÊ(YËÀ´0ŠÄµÍ>£ê×Ùy¦x,Éê˜èЊ3ÝNœÆ« k~}Sùßò3‡Ø½v¡ëî}~s~¡”ríÜb×À"uÿ׺hàƒö)Úʹ]ú’§†{!CÝú/üt]Ï‘ù¾r“Éh×iuݬÇ&™»p¿~Û0…ø•jö°eí eŒpøMT¿3/©P$o²v„L.ÔŇޖ„Ó¬’Ó5]Íø8ˆÀ¤ÓÿŸ÷$r [ :™º†N` C4^²óPQ©«˜R-pº~8µcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP123subsubCAP2P2CRL.crl000066400000000000000000000007221274666402600300340ustar00rootroot000000000000000‚Î0·0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UPolicies P123 subsubCAP12P2 100101083000Z 301231083000Z /0-0U#0€éü¶^VNÑ2ýˆ`køi0 U0  *†H†÷  ‚aÀ“´¢ò{üQOÁÓörØÈÈýW?s¾ëÑB}Rü3€À|ïb­Bå²—š|¹YUÂ`å/PJ›=ù˜=K]"6˨~FS§Þñ­[Y>Σ,„ìæt^6´ªX‰¥3åV 5^H7M‡5†|û©§0,áï?Å-œ;Ù-É­À °y,ç­,¿Ì"?÷ý ä\*KV‘VJ©Š¿ çÜyo5‹c–óP´Yv…„‰ \*:Ò ;™áKdä ±:ÂðkHGáÖ¾ÿ‰ñ:·Œ­ˆò˜oE¤µjùU`ÇIK:|s`”î¸ Ðö©îÄücertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP123subsubsubCAP12P2P1CRL.crl000066400000000000000000000007271274666402600310350ustar00rootroot000000000000000‚Ó0¼0  *†H†÷  0Y1 0 UUS10U Test Certificates 20111)0'U Policies P123 subsubsubCAP12P2P1 100101083000Z 301231083000Z /0-0U#0€‰ „û¬» ×Þ^^žhö9P@ˆ0 U0  *†H†÷  ‚KêŠvî\NíXÿ·õaÈ¿P±€µ~(bŒzжIzN—PsLÓ1P*wÐÝüÙØÐƒƒGËÑ:UW!ð<§ùŠÞí^àä2¯ÇsŸ\‘µì°É§ ^Ã^wäEPk¢í ¦Ãï`ÔW~‡1ýÑcM@#ã:xéÅOZR ª(¦À64}óLk¶­gè®Å:ˆÆ¨§Nî†*ŠY~mL¡„) u–ÉôM[•ía< Tù sW’"‰*hw¼þvòO›bö”iƒŽv é&!ºNü#pXÌ„"‹F÷4,ÌÚÎìcé½ÏpCê6¸ÝKº)oÔýG s0› certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP12CACRL.crl000066400000000000000000000007061274666402600261230ustar00rootroot000000000000000‚Â0«0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UPolicies P12 CA 100101083000Z 301231083000Z /0-0U#0€Ø_5âšÁ7*&΃Ìsp*:â10 U0  *†H†÷  ‚R Š}jfÄ\^ïeÖ©Û°Ö }°íGº;H³޲ߧ4íÞíõP`GÿПÊtÕÚ}ðVâh!SvHŸOøç6°¯üƒê ½<& ´/ÒY-Áo8P´ãþpÞ*ü¬¨bŠ>=èØä`Vo®õ^ž†ü@ <Ê„ðs¶®½2Ù)­Ym‡à.§dhÔºêmÝXÛGt»ŸõðÌ’·‘Â|¬¨!ð;åÛ'¸¾Ñ%Qo®7Ä~4q{<û³•þºÁÒy`€¯ÄUá³ÅšP»|wR0¸25E ›Zæ"ƒ¿Eí¶öΗ5hªE»¦äت¤…NlÁH3¬6—"certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP12subCAP1CRL.crl000066400000000000000000000007131274666402600270340ustar00rootroot000000000000000‚Ç0°0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UPolicies P12 subCAP1 100101083000Z 301231083000Z /0-0U#0€"ž×¸HÎ :]¾ÖMX#VËÖ0 U0  *†H†÷  ‚ž#ÑMŒ/4í^˜ÚG¹çCFÜÝ„±ˆ&‡Õ»’7š}¦m¼°§Í üسx쨵ÏýŠZ¶‹In?ʧcŒ9Ôljë—û,ÛÌ¥"Ÿ”Ÿ¢¡ äÂàg ã±§@:‰^‰ÆÌD‡lfj™–…9W‘C{ãzoìqýò¹ûÚ„Ëëe(Á±% È{jì”dÁ(2Šž þßT[±ù9¬Hg,Ÿ#Χ4¬|5|Ü«Ä*{2Èu=&㵋rbdíja@]òd èBYùã,!ECùn «€®!k(ò˜qiâp!l¸¸nx‘D¾•jcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP12subsubCAP1P2CRL.crl000066400000000000000000000007201274666402600277460ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UPolicies P12 subsubCAP1P2 100101083000Z 301231083000Z /0-0U#0€Ç¥7§Ðú$å|ßÛò]iÛîÊö™î0 U0  *†H†÷  ‚¥®\¼L3±ø2FÀ±ÚÕ¸6äRòælíýK"uб­"»½}}—®|/=Mʶæó&WÎÆHIý%ð‹R0¨å6AY'êrg]ƒô'G<@LñbV ðÇ 1–Ñöf‚.:Š3!>>ÛõÁ6­KYË×FáÂüÑ^*Æ¡Ð-^¥4Ëùö*@nºÉ÷\„¯4lÔK<ääÜ»tý|ºÑÅE%pd’+à¨ø-Æ­`\&v0@¿˜ r+bÂQ€Ä*<òÌ„`QH÷ϘU)Röˆk¼©,J’BÙ“ Æ/Õ?Öeíq¨Ô§?«ÛÈ‹?‹‰œ,mõU!Ècertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP2subCA2CRL.crl000066400000000000000000000007111274666402600266320ustar00rootroot000000000000000‚Å0®0  *†H†÷  0K1 0 UUS10U Test Certificates 201110UPolicies P2 subCA2 100101083000Z 301231083000Z /0-0U#0€,ê¸w=e¥¿3ÌzÒ˜ü¾0 U0  *†H†÷  ‚ICioòŠÒ n_ØìtqŽ£_$RF3±6± ¶ê¥ý‹œ®¤ ÍŸÆÍÀE=Õ»(Gvn”RIÖ &X#îù±Í¿Ò v슅âJÙCn\¦VoÒ„"uVOŽËжú>œžÚ¿€ãÎ㯕&ÿjcúð¨Z”i*ùˆß˜ýdñRÐ,߀ñ¨4V?Ùr{S³”¹Ì%'ÿeVu/Êš{õ‚xŽé6«OØ¥ ºU®u¶•_zw8´®Ê2È0)’‚A ôÿî>¦c˜øÄ=Ú÷ómBȘ•º¬ÀúvQ-!9n‰û¥à­Ë¢gƒ/ú¨Tí#øÉƒ3fÆÄzgcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP2subCACRL.crl000066400000000000000000000007101274666402600265470ustar00rootroot000000000000000‚Ä0­0  *†H†÷  0J1 0 UUS10U Test Certificates 201110UPolicies P2 subCA 100101083000Z 301231083000Z /0-0U#0€^<„sž0prq˜®6Û"|¯0 U0  *†H†÷  ‚‚78‰=KTå*ïR-˜1ôÊQá[w6·%ȉç3è»b ëÏ&ó÷jep±NK}%ƒÐXb1±¶£(ÆÚ7«rIç'åÇ“‚UÛ\ïH´ØHøëÀ®r­ÎN‘¥þéKt’å7]T èŒ3bhXkíR*í¾Qh¹7é ŸqÿrÚ0@:ÞwRçZîãLeŸ >1 šô 5DÒÛûä˜ ešÙÛIpðuÇ€[½¾ 1d/1PêŸóºW—7¼S™n°*£–ÍM¨ ÚO^âu#ˆd=‹´­ª®Æ0»Vƒ<-g¥Úö.òăîNÍøÐÝA#>:Ÿcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/PoliciesP3CACRL.crl000066400000000000000000000007051274666402600260420ustar00rootroot000000000000000‚Á0ª0  *†H†÷  0G1 0 UUS10U Test Certificates 201110UPolicies P3 CA 100101083000Z 301231083000Z /0-0U#0€Ø«, ‹Ã’ÜÆ­j?¿óƘåÜý0 U0  *†H†÷  ‚°Åª‰Z2ki:°Ó>v÷1Þà÷-…õ¢j*öSlÚ‹OmäíN¶©Å”ÏŸMFšç—J½iéˆóC$ýY8X ýÁäì;+W¬Ó á$á&þZ589)Te°dkVãV8Æ&s…+/u» ÃüRìz‰šC½&§²t´õY@¹fÝþ}<ž°irL3 ’³0ÈOg¹è”zVÝúçÖ¤Ôœ&`ÊYÍðtv 6ù­Ÿ†säí;âM×Wh3 ÷k•úxœUO% Šd;Í|¯á/hÞr¥rT­NÉ€›¥î"u΂ŃËÞT©IEW½©žwf”Q|Ž1Ù¯Nû<ԗܺk¸„ certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/RFC3280MandatoryAttributeTypesCACRL.crl000066400000000000000000000010221274666402600316000ustar00rootroot000000000000000‚0÷0  *†H†÷  0“1 0 UUS10U Test Certificates 201110 ’&‰“ò,dgov1 0 ’&‰“ò,dtestcertificates10UMaryland1 0 U3451 0 U.CA 100101083000Z 301231083000Z /0-0U#0€ðQbïÎAÇ·°gtk¼2 3™ë0 U0  *†H†÷  ‚Z“Kò3˜ªoˆï…¿ï€ŸÛñÆ è^¡*`6 ºUû•/O¡BZ^¯gºMBÊRS¶:Ug6¢JRa¶lЬ 5ÿDƒc<„ ° ›y0„ý²sèICí‰Hãø^ˆKNš 1Ï·ãY5ˆxp#C…ý×Tz°z ¹EW bœ«ñý/šäpÝdÂ?Šüh'ã¬ÃÀQaRM>̤áÉÁ±üž¹ü¼=k€­¿¬Õ”Ðó ·ë¾£Â3ì'—ÿ™€ÝÔˆ«åm¥J´ñ„ç¥:·f9!ñÊbd6‚³„kÕÀ‹certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/RevokedsubCACRL.crl000066400000000000000000000007041274666402600262000ustar00rootroot000000000000000‚À0©0  *†H†÷  0F1 0 UUS10U Test Certificates 201110U Revoked subCA 100101083000Z 301231083000Z /0-0U#0€–o’™ évt»_ÔøûÙÏ ï0 U0  *†H†÷  ‚…>­ ?4•Ù,Rí²ÔÑFÙb^ªüûf$¸-óŽšRÿ£dn s›}†ÎåÇ'jl]®mÜ:¿O†kÉrqýØDÈÝóÌvÂ+ÅŠ›h|‚¿´ZׯEÎxcß™ù¦òÉDG Cgíh+êíäòëRªVz>§‚(³ñZôv¹¨n„\`!ve%T•"CÆOë~µ,EC´^¼+ýŽ_J‡ü„E©/ñcŽ.¹ÆeA¢ÅWJŠ+ì*·Åƒ4ů.gŸñ¸½0S*‹Zªzww8Áì yB~>Ö‘Ûp¢"û³™­nÁq\~ÌÂ,I‹˜Q_’àz›©certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/RolloverfromPrintableStringtoUTF8StringCACRL.crl000066400000000000000000000007451274666402600340150ustar00rootroot000000000000000‚á0Ê0  *†H†÷  0g1 0 UUS10U Test Certificates 20111705U .Rollover from PrintableString to UTF8String CA 100101083000Z 301231083000Z /0-0U#0€µmO(?Ç»±˜¤©¥Ð¨[^Jt³ç0 U0  *†H†÷  ‚SÃ,ï&ÐìNóˆu—1KÎÆlµÒŠ€¶L4~máìJ˜e¶IØÁ,@Ñ,Šz»¼sÄU:íw·R ¥æ¦ ô!8 ×1m¹#ìY!¹˜"äÝœŠ3¸¡u t›,°W·;øÖL±$ãEf€.â˜ñ‹Yœ5€Êæ9øæ0vågŽøS›ÎÒŽE©öüéO•zÐ]ç¥b<›³ÐRÌ#Vç)Žû%¿jÏdCyWM‚¿[ú„–Ekéhb7‰É„_¶É'ÎßÖ ŸÌ.â“·ÉNý€S¤Þ×TfG pÍsúºÇ2LGhtÜÚ>¨4xЪmJ´Í”°ŒøIútd™certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/SeparateCertificateandCRLKeysCA2CRL.crl000066400000000000000000000007341274666402600317430ustar00rootroot000000000000000‚Ø0Á0  *†H†÷  0^1 0 UUS10U Test Certificates 20111.0,U%Separate Certificate and CRL Keys CA2 100101083000Z 301231083000Z /0-0U#0€„=„ª|w_1ÝÍ`ó——Ù±0 U0  *†H†÷  ‚£yåkUDNföÔVWºB¢•LëáŸ%ʸ~*¥ò:QHf`?ìÇ_ ­ÍªÔ¡X;iIà›².îniÌÎÐ9V«¦ xJbyU¡ì`¬ò—LRé©á×.N›x6 ì\×Ȯ̃)kû`FÉ»p=$C&Ý*R‚Áó½‹úw•M3+;öÇ*^x@a©ÖÖ¬h·S‘AÿM6È`ki[ÄÍð»³:Žs›ô¶^ÝZÔÃ_Ÿ„ùy=úè½—O$ýس½wô­üúDÿÙŒ'£8à!ÉüÕI8/¸ZùIX"Ýts‘€ìžé šøðJ‘xr¢8C'Ù,í?¾ôÎìÓrï¤ } *­&Žt'ä†Çm4LÍã²ß‚^FH'¼ß8ûV õ¿¡±ùÎq’€Þšÿ Ëb.Ò‹ŽI@ɶº£t³N¡.ЧGý\;̽:¨^Úå:ÅÚs¾B^certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/TrustAnchorRootCRL.crl000066400000000000000000000007471274666402600270120ustar00rootroot000000000000000‚ã0Ì0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U Trust Anchor 100101083000Z 301231083000Z0"0 h 100101083000Z0 0 U  /0-0U#0€ä}_Ñ\•†,®¾u¶e§Ù]¨f0 U0  *†H†÷  ‚«µ»!k¶áLÍð·7ž•8ÑÔ€®ðûÙü64ì–¯y'7ª+GW©¸v¡ór%ÊÖ)¬â¸u­‘aŽ)CnøäåQKJû‚Ñk÷Æ}°ÛÕj¥ Z¼_'Âì·ÞvÒ—œ{¬|éð}/¥OáƒF"²Üû¸DŒ@À,›>¶ÓèÄÓWÀ)A¹Ç&D’ÅÐŽ´eÑÿ¯ÞeuPšíMŽUsµ0+™•d–©t-ÂÌMºqmcqÁS¬ÐãJ6äNGî±vvBm‚”qXR@gð–³cCÙš6J"¡–ø €(òq½&Otز˜ó7HþC,/"TêÜÇd‹J÷wæcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/TwoCRLsCABadCRL.crl000066400000000000000000000007621274666402600257770ustar00rootroot000000000000000‚î0×0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UBad CRL for Two CRLs CA 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  /0-0U#0€¡Ö™€ãmýçîwK_ñIÙ?¾=7Â" ‚éŽîYìí²? ¸ŸuðI„År¹Dì õ§S[žz/ŽÑ ¡m[ìÉóýÛ´¿»;@ú„ÄaK²º">¦Jh¼›=tæÖYlØœ{è’_爕qÜQÑ™!¼¨¢ ˆ1y*8Füdž6š¸r C@-FØTøŒãƒ¸ô¥.rx¶†·>ÚÌ9« k?åÑ8ìJ衵/]´4SÉLb8Tê™d8ð½v…‡qeеKînÌØËWPùJbQñ*\­ðRÛ–ƒ‹Q-<Ãø–cFwÄXb?G‰˜TÝŠ4GFvj•¦mUfÄÒPËèÀcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/TwoCRLsCAGoodCRL.crl000066400000000000000000000007021274666402600261730ustar00rootroot000000000000000‚¾0§0  *†H†÷  0D1 0 UUS10U Test Certificates 201110U Two CRLs CA 100101083000Z 301231083000Z /0-0U#0€¡Ö™€ãmýçîwK_ñIÙ³¢ë8 &gÓìBÝ*‡kIÑ M’äœ@¹±_#Ub(c‰fT„#”šÈî‘2PEHx;’vˆ³Ö¾ J4certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/UTF8StringCaseInsensitiveMatchCACRL.crl000066400000000000000000000007331274666402600320000ustar00rootroot000000000000000‚×0À0  *†H†÷  0]1 0 UUS10U Test Certificates 20111-0+U $UTF8String Case Insensitive Match CA 100101083000Z 301231083000Z /0-0U#0€`ßÑÊ©P’!DÒwõj­¦¾x0 U0  *†H†÷  ‚~r£ÓÆU €7)³9E¸Vù Ò¸©‹¤š|Т·¡mB8Œ³>±¿6í‘yb+kÒʼ®­öAäÜ$êúñ½ýRÕ»>?o_À•x/S,+2&—*µ¿t b~¾ô8!‚ü‚Á R $ÿŒSAš°¿ü~µsF=éòD߆’ôó”â(%Ê™àôWì¼Ù^±n&ñŸ¤îæG6iA0o²Í8}dVyª¯™Ž·€¤îÜdTDúý!6_‚*ðî¶¾[Öè} :Ñ‹’Œê¶ÓèÄÓWÀ)A¹Ç&D’ÅÐŽ´eÑÿ¯ÞeuPšíMŽUsµ0+™•d–©t-ÂÌMºqmcqÁS¬ÐãJ6äNGî±vvBm‚”qXR@gð–³cCÙš6J"¡–ø €(òq½&Otز˜ó7HþC,/"TêÜÇd‹J÷wæcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/anyPolicyCACRL.crl000066400000000000000000000007031274666402600260350ustar00rootroot000000000000000‚¿0¨0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U anyPolicy CA 100101083000Z 301231083000Z /0-0U#0€»ÉÞÈ•çB⢎®\«$`~…0 U0  *†H†÷  ‚[¸ºÍÓë+F¦K¼‘‚ŸÙeqöÚˆ0X~¾÷‚Å‘ÿÚ6d^_¿û_E/E%7EV)›X5\ð„¬¯iÇ·F7ÃÚ€Êã\Ë€ ã»8 r6)À¾Û ðè[{5Wâ-²Ã}nD*»¿úÚGDULw2 *¼ ºÛ Ö• *Ùtà¯-4ª?6m+IŽÔtÓ„<·Ú§¨†DÐD3|n2<'ë‰Ù(•÷¡C¤ï”5ÄëýW•öÌtÄ :©’S缜¿(!¡›MŸ#ЈdxLâœF§ù¤‹‘/—qir®FKØV¤tå¢]certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/basicConstraintsCriticalcAFalseCACRL.crl000066400000000000000000000007341274666402600322750ustar00rootroot000000000000000‚Ø0Á0  *†H†÷  0^1 0 UUS10U Test Certificates 20111.0,U%basicConstraints Critical cA False CA 100101083000Z 301231083000Z /0-0U#0€pßD/™sò6<4Ð Ñòí0 U0  *†H†÷  ‚VŠà¦!¬j?£ÒSó§dh%7‹êºàé¯WŽô”÷^Öò:® kŒ5¦ ].ª^æ1ê²V6Uåì9ó{KÆ»NšéýÓ9}ÒpÖXcßîÕTl_ÏòÞB”ƒo„AÚû½€£…"Ù"ê¤ ä»^t;}‘»ËóQŽ¥ý'œÈ"fס¿Ã×ÀãëgvÛÁ¾ðÈÁ‰þ,jì{— ‘®"Gà–ÎÂ#p {œ)áƒyüðÔ—¬‹+{RÈÕ€JzÈ©´é CÆÒ\u;EûŸç{Kú÷íDoñ´|5èä0M'½p£BRÈÉÐ6÷øµ '³Dƒß5Ž­ºÃÅf‘certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/basicConstraintsNotCriticalCACRL.crl000066400000000000000000000007271274666402600315410ustar00rootroot000000000000000‚Ó0¼0  *†H†÷  0Y1 0 UUS10U Test Certificates 20111)0'U basicConstraints Not Critical CA 100101083000Z 301231083000Z /0-0U#0€ ¤¹0C¬CÈ4ÏïUè¿pŸF¯0 U0  *†H†÷  ‚Xý•¤•‚S¡{¥ÎòjÆÞ&…Ú xC+@·ÿË9XË•Ýo á ¥C±0Äch`üª)$¿l2w@EŠú×PÿŽÓ×FSH,¨žfݾs” $ËÖàªÂÑ‚>šÎ¥î‹@—‚= {µ‹å,Bej“”½vˆšÜÕ9Kƒ‰¥Å„OØç-]Ú x‹§0ŠÔ䥶¢[ã°zŸE ¿h²ÝçÔœ‰o¥Û(솀[v¨£'Ær%p4 Ý٢₊ñ×è\ƒ]…R åÕ°Çm¿˜=Gxö%{£pÇìU}¡[V„ô‹Ç@\IÞ|ÎçÕsšuiÚ[Àâcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/basicConstraintsNotCriticalcAFalseCACRL.crl000066400000000000000000000007401274666402600327530ustar00rootroot000000000000000‚Ü0Å0  *†H†÷  0b1 0 UUS10U Test Certificates 20111200U)basicConstraints Not Critical cA False CA 100101083000Z 301231083000Z /0-0U#0€9Л·O)7¾Ó°ŠvêjžÍïF¾X0 U0  *†H†÷  ‚y½.ÂT«7¯Á»-LWÉN»@àòI÷Ó9öb->}ÿvË\ß§2·1!_«Ú%("’¦‚ÂÓeUâøá~pŒèÓy'®u×ëFÿy[½_–²•0<0U#0€w#åv„È”?‚Ðêt±à¤/30 Uÿ0 U0  *†H†÷  ‚V}22ÖYÇ<‘Û¿ª÷€ö`¾Á ŽÊnî ïN%¿p2h6ø!Ä®âÀ†wc»—SƒvŠX×ÜÕdck(fg¯“‘uôÄíúø²é×}¶òÔñ¶M} ¶×ð¤`áó'ÎÕ!c‘Éf ÿÕÿ&®k¥%Ì¿±r¾Žü$sµ—'ÌË/€hö&oG8‘ú ç`2¶¸¯«¾¢\·Xdd…û²xIX3!Ý>µ€†Ýà-ŽÍÐÇ/Œ÷Tø^WÊæ-¼‚N¡7’)<_ W˜œñ`„|žœ‹I²bäƒèqÔäÿ¯ÑL-SÂ3T_´ÿu¨\¼mDcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/deltaCRLCA2CRL.crl000066400000000000000000000011041274666402600255760ustar00rootroot000000000000000‚@0‚(0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA2 100601083000Z 301231083000Z0"0  100101083000Z0 0 U  Š0‡0U#0€|Øö¾LÎÏ·?¡»3«µ×ûÄ0XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA20 U0  *†H†÷  ‚ç±²áuÄÌèø¡¶aÎ0ðx&_¿DEìÓÍ‹5‹’ÀZÀÜ>á &¾µ-¹vÅè¨û  TNÎNëù’)=èÌ”)j ®GÁ·sdº#xÎ'ñ8_1³Îÿ’‹åxbg *ßéÄIÙwWI»êÁù4²RN¸žWØ2gâw¾Ùgú›:)© §­Z >PÇ+7þvGÔÿ`k ‹æknÿÅ7ãk~âÁ[.n×þœƒpù)ö‰ö9 €F½Ð r- gÚO±>šå†$å&þ–pâ¨g$>³Òá¢~G9k9hMÊÀWRæú5Îv>ÏR¿‹Ûãµßš¶áPLcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/deltaCRLCA2deltaCRL.crl000066400000000000000000000007661274666402600266250ustar00rootroot000000000000000‚ò0Û0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA2 110101083000Z 301231083000Z0"0  100101083000Z0 0 U  >0<0U#0€|Øö¾LÎÏ·?¡»3«µ×ûÄ0 Uÿ0 U0  *†H†÷  ‚Y~oè~ª™(«£v`bKÈ‹…ƒ„ ¦3 \Ðî»>˜øÔö /øPEqɼÆÑq0~ôòÜÞo:@Ãa<¢\z’GViàÐÓ}Ã0’{ž†É(=æ[<üþœØÕŠ»Frâ½êÇÚZˆ)RÖ߉Ht  xŭ㎿™¥ ó½9h«.-jc¶éðQïT/÷9certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/deltaCRLCA3CRL.crl000066400000000000000000000010401274666402600255760ustar00rootroot000000000000000‚0‚0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA3 100101083000Z 100601083000Z Š0‡0U#0€ïcÓ¨N±ùßaâ ã˜Ò“™ç0XU.Q0O0M K I¤G0E1 0 UUS10U Test Certificates 201110U deltaCRL CA30 U0  *†H†÷  ‚\å 5 aJ­MÁÍùRNÙ¢ ®JÌÆk^æ¨{{úEŒCK^Ó²ù+|eŽpAIôÌæJ€¸?YÒ®dÅUMFæa½Sæâ cÒ³ÄQ›Ïûɑš®€ºHª5 o 4Šyµ &n`Ò·4èµF‰Ï˜€­©p,&à™À„a]攈T9@8ñl4Yé…(ôðô UÝDF¤ìë0– 8—ßЃ•܆Á'>Äp­l‘¸Å_¿Aí÷&'ù‡Au(Ð.ÓR¯ãœ¥uüº¶P§†UA÷9;8y½±D­Y>?W†+ýò&p£hQ¯2‡¿¸/ ]Þ ¸*yPƒ?𧇢certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/deltaCRLCA3deltaCRL.crl000066400000000000000000000007221274666402600266160ustar00rootroot000000000000000‚Î0·0  *†H†÷  0E1 0 UUS10U Test Certificates 201110U deltaCRL CA3 100601083000Z 301231083000Z >0<0U#0€ïcÓ¨N±ùßaâ ã˜Ò“™ç0 Uÿ0 U0  *†H†÷  ‚˼¥jÎy’ª3žZ–K×éÄ ·O‰’…á,éßn‹¨+8‘ÝzU¸·šûý¢(ÎÐ Z2y†Iƒ¥Ÿ4¶àú6TÕnX}d `@õÔà®'0—nᣢ™Æs|cß\fÞ8—åÐPÐ3Î/‘‰àì*Û}ɼBH]‘‹Á þuJ6Du—>ßÛ$ª—·j‹dCpëKýp¸nNeË(6rërï“NŸ2º åõ`Eï2„·¹í–ŽP„ó~=®Hb’ùÅX‡ÜÖËvÀk9£°¨U+e•ƒª±ÃÒah Ö‹!~Ä Ad!õ,„ÏÀWÁ¦è#Ìôò‹ÑÎcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/deltaCRLIndicatorNoBaseCACRL.crl000066400000000000000000000007421274666402600304500ustar00rootroot000000000000000‚Þ0Ç0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UdeltaCRLIndicator No Base CA 100501083000Z 301231083000Z >0<0U#0€ô8v%«¤ãÀÈuŒkc#¶Š0 Uÿ0 U0  *†H†÷  ‚“˜ûX&oØ>‡7#í¼ ;NìxÙ #è=¸3÷÷‚2Fƒ>«Ñ6; ~uØ#šî%èdKgÍÙJ0!D?ô”­>Û²P'[$‡´Ô%n–ñ­"À00ÙŠAOêªÏr .^SˆF…Äð¸4@qG@^|ø;9‘OÀ&¥½ú9Á¢„ÆýÁ{®%;Ò¹|©S›ú<0®üqÓ¬=;e˜ Çj®#›Å3Ó—·¦¥ g#þÅ6®Šz“!yŸ)!×õb.nŶæ‹8¬yq?ƒ™pD,ˆÊ´1ÏÑL8Ï„¨@Põóù¶†ßÏè¨ ÛTÉøªcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/distributionPoint1CACRL.crl000066400000000000000000000012011274666402600276720ustar00rootroot000000000000000‚}0‚e0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint1 CA 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  ¾0»0U#0€0s½p(‚ÒoÏÒ7íÍë#‘Ûï0‹Uÿ€0~ | z¤x0v1 0 UUS10U Test Certificates 201110U distributionPoint1 CA1&0$UCRL1 of distributionPoint1 CA0 U0  *†H†÷  ‚*ñéyïÖòóÔ ½­zbº7\ò}•{¿—Ç Bš˜Ÿ oS¥±o……Á Hlê©­´ìÞ|ÑAdªŠ%& î€r «È§òÀe Q]Ñ– ¸m»OD‰«CE´ÉYÕ`‰­Óªš›w5 —™œDÜŸ~[æ¢Àš¿„iW > ~Z°¹½$ƒ¥êŸpšáù¾Îsß%ýFþ'ëÞó%f1Z¿Ñ„†¿–v"5öWØ–v7>pÜŽ2ù¸Ó<¹p剥⋳8ÔÈáß1 ÿQ›Ø#2¦m´í·ÈÖî#¿¿Ó-/ÄèÚO8’Ü:°ZuR &b±Û`õ<Mcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/distributionPoint2CACRL.crl000066400000000000000000000010511274666402600276760ustar00rootroot000000000000000‚%0‚ 0  *†H†÷  0N1 0 UUS10U Test Certificates 201110U distributionPoint2 CA 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  g0e0U#0€DlîÛoëNIxþÍå ì»`k06Uÿ,0* (¡&0$UCRL1 of distributionPoint2 CA0 U0  *†H†÷  ‚ž´F[JÌl ø·Ÿ£}Ÿåêã@ ü"5&ïPrïV^ÁµÔ*™;[4¤îÓæÌÇ]VSz‘!©Y˜im?Ç­q#ýцpÚbÆ[¯’Cev ëƒÐP(Ú“ & 6ΛJW¾P¬A0¦uc²þÀäz¨1.æ/ÕÙÜçêÇŸý&E¹/X6Î î„ò)–%®,»Sšf°qÚŒbê~Ãñ¢_DšÈ»ExÀ½únÿÓ"°m½=certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/indirectCRLCA1CRL.crl000066400000000000000000000007731274666402600263200ustar00rootroot000000000000000‚÷0à0  *†H†÷  0H1 0 UUS10U Test Certificates 201110UindirectCRL CA1 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  @0>0U#0€%ø¯ü¯¶©yKÛËd,‹K±Í0Uÿ0„ÿ0 U0  *†H†÷  ‚ ª%@•a¸YT·BT:”µú\h¯ /1*¡&áô¾céÛ€CÏ¥ñ¤&pg¡üi.:xo 1’LKóZ“¾ëÛ…æ®c=Úiks÷°5lËȸÀŸÃK´e7W³–{GM× Æn٘ʣ¹ï.WN´ÔÕS5‰Žt°Å…gXéÞG&:Mò›oõ‡­lZYD±¹¼™—¿é'!‹ëÆÊN|š=æ*m$žßòfèÛ†ÝÂÕ-¼Ï"®§ðZ¹¯Ú\š~]ÚàuÒ)K~5Ô¸Ö?6Xgð,)ÜÒWèüUÄÇCCZ‹@ó MÎO|ÔïìŠC Gbcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/indirectCRLCA3CRL.crl000066400000000000000000000010661274666402600263160ustar00rootroot000000000000000‚20‚0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA3 100101083000Z 301231083000Z 0š0U#0€H“T}Äm0ÿ-WEq$ßLŸJ-0kUÿa0_ ] [¤Y0W1 0 UUS10U Test Certificates 201110U indirectCRL CA31 0 UCRL10 U0  *†H†÷  ‚+óXô¦÷ÍÕ¼lå¾É3[Z†u4„¼Í$CÓ}ÈLÔvä>’EZ®=¿jYÍàNÜ1lå«Z¡s¾–G€)Œöf n3— ^km½ì×’ø&\LÚædÎfž}¯óC$$»[å¼ùktüå»÷Ã{—ñFbDxÀ µÙ盇Ķ Æà{²›Ñ%Ÿë(ŸäÜ¿nÂ!}`U±q2<ªßMÕàI­»\Fê¶¹nNB¡fwBD©LajÓía?q;KsëXøÈ~£Ó0.áÌè胉]ÚtT™e©dc u2„'G…®£§ÄsÏvá†"lÒcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/indirectCRLCA3cRLIssuerCRL.crl000066400000000000000000000011561274666402600301120ustar00rootroot000000000000000‚j0‚R0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer 100101083000Z 301231083000Z Ë0È0U#0€‘Ñ9˜ÉïOTeŠR-| lw0˜Uÿ0Š „ ¤0}1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA3 cRLIssuer1)0'U indirect CRL for indirectCRL CA3„ÿ0 U0  *†H†÷  ‚4Ùã¾›©Ãg¼‹bÄìl,ÜÜ÷Sá´åŠxÄÂÜâ(*?Öúhï±µó'k#SÀö{z‡»zt”‹?æW^âà!/ÞR A<þ“ÆÆÚ† )ÊFË]dú¶&ú¢±‘bx(J޽¼«Ó  ¸2D,Û¸#ÝÌ›“q¹|A¦¤NqWÛÖmÿ÷¿9UN¾OäCðSåeº‰E‘"ÑH ^6Ød‹Ê Gåë·M€Æ±õ Ú#Šÿ€ýƒ ò”*ðMŠ h“Ë?çMž†SÀÈD/€ÍíüÖôS‡(¦¬6ön ËÎ8kÅÕ_hÙó.†ˆ°©ÖòñN0Âcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/indirectCRLCA4cRLIssuerCRL.crl000066400000000000000000000011561274666402600301130ustar00rootroot000000000000000‚j0‚R0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA4 cRLIssuer 100101083000Z 301231083000Z Ë0È0U#0€óëm¹Å ¤ÚEÿ¯zG¯À¹0˜Uÿ0Š „ ¤0}1 0 UUS10U Test Certificates 20111"0 U indirectCRL CA4 cRLIssuer1)0'U indirect CRL for indirectCRL CA4„ÿ0 U0  *†H†÷  ‚)ò¬ŠBôz›Ôò´¾1ºÊV”í‡=È‹ Ü>üµ~;N–Ï'P^ñ„Ÿèä™}j²¸ ÐwU¿9WõÉ‚z±¦¢^-(CsÞOJå ÙúîܺÅ™ý–œr©ú°ÖÜ ÑÖíëðP-ŠNEîz,ÖÑQƒfEÈž•8%At•ùXüÂê—/•Ž’ŽÁôzRGèw£¼¿#ð…I´UnÀÄóGþ¦êr’c2|7Às§’ËQô:¦I‚Eam¶µãϺ3s¡Ìé°Lyf—Þ“t:Æ4Wô&9 ,òcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/indirectCRLCA5CRL.crl000066400000000000000000000030511274666402600263140ustar00rootroot000000000000000‚%0‚ 0  *†H†÷  0H1 0 UUS10U Test Certificates 201110U indirectCRL CA5 100101083000Z 301231083000Z0‚Þ0  100101083000Z0 0 U 0z 100101083000Z0f0 U 0XUÿN0L¤J0H1 0 UUS10U Test Certificates 201110UindirectCRL CA60  100101083000Z0 0 U 0  100101083000Z0 0 U 0z 100101083000Z0f0 U 0XUÿN0L¤J0H1 0 UUS10U Test Certificates 201110UindirectCRL CA70  100101083000Z0 0 U 0  100101083000Z0 0 U 0z 100101083000Z0f0 U 0XUÿN0L¤J0H1 0 UUS10U Test Certificates 201110UindirectCRL CA60   100101083000Z0 0 U 0z  100101083000Z0f0 U 0XUÿN0L¤J0H1 0 UUS10U Test Certificates 201110U indirectCRL CA50   100101083000Z0 0 U  ‚­0‚©0U#0€÷ª½HuY€°Ïß#Ø“F‚³0‚xUÿ‚l0‚h ‚a ‚]¤u0s1 0 UUS10U Test Certificates 201110U indirectCRL CA51)0'U indirect CRL for indirectCRL CA6¤u0s1 0 UUS10U Test Certificates 201110U indirectCRL CA51)0'U indirect CRL for indirectCRL CA7¤m0k1 0 UUS10U Test Certificates 201110U indirectCRL CA51!0UCRL1 for indirectCRL CA5„ÿ0 U0  *†H†÷  ‚·›•ŠFª÷ÞÚp€È0ŠªEK'ç΂p´\];½.8¢Ï’Íg{›u•ìé[cŽ¥áŽ Í§Õ»îÒ.YiJn×j±:–…gÇ׫úbÜc·Æ¨ ‚i)”ú-T¸Àº¶ò&@ú+à‹ó_ySéÊ:y9 ¼kÿÝ™=S’æazÚÊ;,4hbÉ"@<ˆÅ‡º*w©„PuŽ¿ÿ8ƒœHüV¶¹²2ÑSñ6òæ8uÒÃ?£C+-Ñ"êHbª?YîF jíWieèG&eà Úy 1͈ qá«î]˜Üo IàïÉ@_*౉GãÝrÕ;¨þcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy0CACRL.crl000066400000000000000000000007131274666402600274250ustar00rootroot000000000000000‚Ç0°0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy0 CA 100101083000Z 301231083000Z /0-0U#0€  zjÿj…‚$ÍÃ&…ø¿Š70 U0  *†H†÷  ‚~xó'ßeРÆY&µëœIZŠ bz‘µ.9å%yš~Ü7–O¾=$H¥1*Û¯nç3nߣ0˜Sž ! ‡Û=ñ­!êJ%PàÒ$®vŸ£khßÖÚV¹¨Ñù$â›êi^‚m­ë(ûJåÃjé„Òî‹L¦õO2Ùµm¨’#J`NU'Bá{±¹”zóòï“õ›]ž0ÒTþ•á3šj jS\m¨@Nܳ¬l̦¹4F$ï¡gX7¿çWˆH™qà(ÒC›^°–æóá-sØ`ÚÅ©ZT:a—lG "dÆmmos´xq=|§•âaòcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy1CACRL.crl000066400000000000000000000007131274666402600274260ustar00rootroot000000000000000‚Ç0°0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy1 CA 100101083000Z 301231083000Z /0-0U#0€ئž'—ÃŽÔ!× ¼œí¡{òÓ0 U0  *†H†÷  ‚LÚ´cGJ_€2ï 8Ô•ÖÜ V³žKØR”«h1;Eý6ñZ  Wôl(&#Îð\§Ð°ŸÇ"/ d‹A5$ßàò“L„K/ÂÏD}Ýàž#l¾1žã|þŒ! 9åxŠRôchS˜s+ö¿µ`6´£™§£1azu ]g9¹MÍÄ»Ÿ®þ…EÞD9«KÜkqS+W9Ѹ F½ë#Ü0¢`'U¸~NÅ·b âPÌùÍàKO“}ì´aO~í$ß´€µÿIц&g`+¨'†ÈMš£r÷ê:¥‘ÏÒëhãõç:qÊQ©×ø(;&µ4¡J5'certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy1subCA1CRL.crl000066400000000000000000000007171274666402600302250ustar00rootroot000000000000000‚Ë0´0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA1 100101083000Z 301231083000Z /0-0U#0€t ÕXÙ+SÒ+°Í]qÆ¡¿C§È0 U0  *†H†÷  ‚qÛ3*jÚQ iß;Ýä¡6€ Z}_ø›Å“ï¶\@«Ê/˜ìg”ÃëÔÇVÑØ€2aÇ*ô_,r`pnj‘ÁtßC‚®ß{Ö–G¸åBð\âä_ãmg 1} ¹2Jœ>Î’_QÂ5âô@¬þm|(º¨ž˜õ KËzV_ÀÒÒ9Õéd›zq¢©¨‰£9íy#¼çgôãÿ7Ÿ¨`2Ü9"»ú}4<ÈjŽ!¸á®hú°:"Ao÷x3 BŽæ†tÇQ™À«íÛI$& 3B̹ÚÒLßÈuYämé$c¶’!]Ö”ì³éšúBcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy1subCA2CRL.crl000066400000000000000000000007171274666402600302260ustar00rootroot000000000000000‚Ë0´0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitAnyPolicy1 subCA2 100101083000Z 301231083000Z /0-0U#0€ŒÜß~dÛb¾ÛKQdŒjfØ\££0 U0  *†H†÷  ‚²³÷GöÓ¼ןÃDù+Ð*û:Z¯þ¹¼Ðü¾¾ÄQžOßí¼‚XLÖ3§ó@x½‡•¨ÂBfƒí?n‹’ýô°$XD?‘£=ïmZG°e¥,)™xHT[ÿȼ&ýQ·ÿhÀøÚo.v¡A×$[ÈB¬Ë›s¨ß@½Š 1!ÂálòŸ5#c—¸ÿªOO­ g#GléæD&Ò¥˜÷ 2#ÂãÛ¿‚v$«a6ýÆáS÷¹3(Vï²Où)‰ËÚâ÷…•+\ÿ¬sÍ5ª_—7éçOåŽQ÷´ŠÉùArŠ“Ç„ÎE¥zð.8ø!(ÒX0@>Ô€¯ócertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy1subCAIAP5CRL.crl000066400000000000000000000007221274666402600305570ustar00rootroot000000000000000‚Î0·0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitAnyPolicy1 subCAIAP5 100101083000Z 301231083000Z /0-0U#0€‰Tt`³÷n aŽû¾R&0 U0  *†H†÷  ‚梺Ëi9Q ·šÑ©"Oo憃ÛÍCþ¼q¨\AÁYûO ^xhîòÖç‘6šs™¦0þ` 93U)¹™ŠÓƒ^}˜kf7(.9P/!”#œÙ—Ȧý·ù(xvÔŠ W£’ª [Š->wmgC4^ß-ï·¾e¡óØãÇÐJ …2(BÎ ‘ ëÚÅõ+‘Éù6×¥¥ßî;£´CÜE†&]Žp˜ê«`Cÿc»þ‘iv¼Ó•YK'V¢z¨ÕDù>"W ÉJ»˜f—œÈÔZmÔE*ɺ¢ú Ñ-ýPå;Rw»Æw½qr¾3NIócertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy1subsubCA2CRL.crl000066400000000000000000000007221274666402600307340ustar00rootroot000000000000000‚Î0·0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitAnyPolicy1 subsubCA2 100101083000Z 301231083000Z /0-0U#0€}ÀœŠvùI3÷¤KŽ0u•;èˆ0 U0  *†H†÷  ‚¬MIqŽ1’ÈúIÙ½hEeéKc(-orÒß &Cx´ËŠ™Ãѯ°;Rv¸‡m¨‡ô,C¯¥~N‹FÕ64ã¶Äýs🺉^øeB\*†úÿ`é\´šÉCM/\ØðÎKé_±ëH¨èiïÌK‰ ‡'Žj äßkkדö ‚Qï×;ót€Ã£°ù!棆 ¨ ÷õð°@œÔÜq³S] 𸮼`¯1bj@ù`ÌB‘& UñyËö² òâ*ÉÓﶬR5YÕŠIŒïåô†E€£5Wq- ÃÖ†ýÃŽõ(àH0É' ®²EY[úM¹«­øcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy5CACRL.crl000066400000000000000000000007131274666402600274320ustar00rootroot000000000000000‚Ç0°0  *†H†÷  0M1 0 UUS10U Test Certificates 201110UinhibitAnyPolicy5 CA 100101083000Z 301231083000Z /0-0U#0€À&çiÖ|ð½ÕªSeùœË 0 U0  *†H†÷  ‚—!ÇÐ,Nr y›´=•¡õ÷ãOu³kBÝÝÍÌ‘%¨âQA±½Ï¿K÷¡0¢’&f‡Ñ#Mš×@ÔN…K—r‰ ã8?.õý6fr÷>$¹4ÌÈ¥ˆd¨í‘/ÁƒgmˆÝ¹i¡VÓlÇŒãæòÔ~“‰—Å*ßêwQµŒÑôôÞ<Åž£ÜH…PxàJ´–2?cÖýD¡üý…Úvv3¢þ i[ÂM»š–ôwËA‰=­"ŠbÛ()©¬ñ¹ˆq4ˬ”–ØÒ‰¯²æÆ3d1¢V°W©wñÌ¡u‚ëÈRÑò9¾ðÓ#1êÀéÆ|uÑÌ5±@ápÃÛVcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy5subCACRL.crl000066400000000000000000000007161274666402600301470ustar00rootroot000000000000000‚Ê0³0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UinhibitAnyPolicy5 subCA 100101083000Z 301231083000Z /0-0U#0€l™©¶ë¾pI6LXš"舅/Û0 U0  *†H†÷  ‚ŸpŸúÛ©ðZþŸå ôPÑ_:nZARÄoW¨î4³»+³oˆ˜àLÕùX·Ó…ÓÃTx»ÄÞÁqØ¥ýÖ²þÿFŠÀ÷!¯*aÛrD&ô˽ê8•'QU¢S¹5ì9Õ£4 æt+æªû#Ø fç-s&`pã*³¤Ûy â3©_N²b7Û³\Bnæô×fû~¬¿ÅeÑZ˜/®‡ußL:¼*Ã6÷m7}gçm„WÂ7‰úî" í-Žˆ ðŽ4=Ógx¾91Ÿ…ë1o˜Ü"D¨KœkLMvŠÖ‹‚Ð{ˆBQ?FƒŸk£g#Ü%e3nk’}¼V¹¯òcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitAnyPolicy5subsubCACRL.crl000066400000000000000000000007211274666402600306550ustar00rootroot000000000000000‚Í0¶0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UinhibitAnyPolicy5 subsubCA 100101083000Z 301231083000Z /0-0U#0€1á?übn€eÍ©y+n‰ZèÃ0 U0  *†H†÷  ‚A5q£>HÌÇ(˜£qy)æYØ0&òœyaR-âú’ͳ~ Ï·µj¨i€”ÀyÚaƒ¢Vo‹`ç¡)s§¦EÚ!Å ¼™ãû[£8w†¦9ämYg6q{#×úåÁÞ94‡T`Å Q “èô¼oQs4Ot2˜ö²ã–ññøêÉíwì˜ìåˆ)}Wg(léÚ˜’ˆ˜]Š%zöÜï½ ¹“tÛÒ…£žÊ7ÙåòÊ”›=6ñAuj«†ã±[?¸tÆQ—¸`öær–j3T×—Gü—òªœU~dé‹ix!Ϻ½ ˜š3,àZÛÑà´VXö¿Êè¿&úñcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping0CACRL.crl000066400000000000000000000007171274666402600302750ustar00rootroot000000000000000‚Ë0´0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UinhibitPolicyMapping0 CA 100101083000Z 301231083000Z /0-0U#0€X7&‘„`¬îö@>¥+üÿ—Û0 U0  *†H†÷  ‚½-{ùtÇIP4«+ôîæ“žÓ…62HR,µK`*èÇ«Îü [l $ªÉÿùÿTZ„w Ø0È]-ˆa›Ú„Ÿ‹I²°7óSý—ßRkž¯¾‰B¯·ïA€f<Æ·T8çU§Ã‚Ó:—Ó|ƒ­uª^[Bs±›(jeÚÑf~CÕ‹ÚÓØ a>ê8Cè÷á1™_¬ìCJ%„HÐÝAÄÌs~ZÖyçEÎÉšå#:™öºš!¤Ü>I÷CÝÅ2³` _ŸEÊžú‰=届OYL­žÞÞÐÚX±”ÆunVóûáÖ62$ÜÓ~M•þõ-ïªÅE@certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping0subCACRL.crl000066400000000000000000000007221274666402600310030ustar00rootroot000000000000000‚Î0·0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping0 subCA 100101083000Z 301231083000Z /0-0U#0€ÿ´sbR\–:Z®¼¸‹~i4©Ÿ–I½›=¯ØÔ¬®Æð‡Ž`žA¹¥Ã³w_&kÍ N¦‘4º+ÒnSðrˆ3í[‹**A‹É~sPcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping1P12CACRL.crl000066400000000000000000000007231274666402600305560ustar00rootroot000000000000000‚Ï0¸0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UinhibitPolicyMapping1 P12 CA 100101083000Z 301231083000Z /0-0U#0€Mg~Ý9¯è&Þ4x±uÚ¤0 U0  *†H†÷  ‚äÀ˜ÖàŒhÐîêãÒ¬#ì…õ:5™ÝÇØ…¡ÖZzš¿{° ˜€ëîø²ØWò6y‹D–φÿÝ×HøØr—+¡~ÛúÈÀÊì¦fšÉzãc“ÓØª³”€¡B˜ðf6µÛÚ„9úGŠQëÅÔnbÈèh¿aOéÅÿq3x|¨Ñfâëc $ÎB^íêÔ­”×c5r~S9´¾ç‹Ëß–\ÎSãkžåi-ÚÑ`‰ Må·­‰n\ô Gç‰w¡èý¶pR³i´¸*rçÝ×§†Aåè¸Ê^c°^R…Vkú…›î4œåíûP:Õ.—certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping1P12subCACRL.crl000066400000000000000000000007261274666402600312730ustar00rootroot000000000000000‚Ò0»0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UinhibitPolicyMapping1 P12 subCA 100101083000Z 301231083000Z /0-0U#0€ª&”d~¼]`Wüp•flç0 U0  *†H†÷  ‚hsG\½1æ<þ*:²ÁYu—#Êü:ƒèHù™¯Ù‚@6ÈÙØ›)í±=[°ó>æÐ$‘¬ƒ¯¢ÌLŒÑš«Ô¼[ghPŸù-i<2w:Q›Ð¤[æ%§ÝcW,“¥dìPl íÕV% níÛU ´ É`=ó¸Ì¿Œ©ãƒão P(VF²g¡–Ú®ÁR9¤@NFÓF^Át×,²¸}M3aˆ\aÐw‡µ)gI-¿J) -_¸A$w®âü½ç½i¸K?D°à[³¤IÛ:ÂõL:»f6|±vJ{µÄIç»°9pØèJ¾¹³6¦"}certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping1P12subCAIPM5CRL.crl000066400000000000000000000007321274666402600317230ustar00rootroot000000000000000‚Ö0¿0  *†H†÷  0\1 0 UUS10U Test Certificates 20111,0*U#inhibitPolicyMapping1 P12 subCAIPM5 100101083000Z 301231083000Z /0-0U#0€Ïv'";Âô‚.îæÝ€{S0 U0  *†H†÷  ‚“÷¶Y÷ýñyR’ï)hv9²êgîÕ‰ìÈáĘ~ÜY8`|ÇŸ‚=zë‚ëë¢cþ†ù5,t#ÕÎiµ-Îa¦±"¿wg8—£ZŽÏÅ68î"{eU2a¿æÅCñŠIPìQ´EHäâäÆM¬xø’Q®±Œ÷Ã#LÿïÉ£„Of‹6"íaT³~úÅ<ˆÅL{¿ì"ƒ«7åÂçT~œdB–‹¼oûR.ÙÊÑzÏIkËVX*âýÿ$“¼µ¼ ¢ÆøÏ½îé{Êoµ¬1ñ§¶‡©ÓŸÖ<Òxä½ [†Û™ø3½åCG,¬³CY4 °BüÂ4' ÇC*êÜ.¶d4h÷´„vnÜ7ruämÅꦾtØ™ÙB¥Åð)Á,™Ú|:H è¼TôI*ømÇm¤R )§xªl²žöÍ—ÈÛGÅòO9nHójÖq<Í£ñÐ\›ï*™(¥-]•žœwùØ„£Ö-ºÃC·à 3…ji‹kcùz—xxrm󿹝[ò‹¯„m®Õécertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping1P1CACRL.crl000066400000000000000000000007221274666402600304730ustar00rootroot000000000000000‚Î0·0  *†H†÷  0T1 0 UUS10U Test Certificates 20111$0"UinhibitPolicyMapping1 P1 CA 100101083000Z 301231083000Z /0-0U#0€¾¶½)¡Ù‹á¤€hƒ(­Jð0 U0  *†H†÷  ‚Rÿ¯&RŠí2¥ÈïÓÿ*ßÛ p¤vºt‘Ñz¨Ë‡§¿‰t—= ×¾àëë‚ø£Ë<_œ»‡Ÿ¢½ɘ¶–z²>ùø‹‰ ÞwÝx*9®Æ¶iznWÐë™FC%ƒZƒ1‰MÜA*rš]gMò÷D¯Ãõ{[¿›ñåI˜}#¤ ”3Ž!¤z·D2æx”%-¨œ=‰›hcùg¼_Nó·+öE ~´ñ“ DÏ ¿K• ó ôÏq_p“­x£éœÖ°çéÔC"ºÂ­‹§äêlš¡§"ÿ”øJ,ÆU訜ÍÚ4®óC R»H““àÊbxcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping1P1subCACRL.crl000066400000000000000000000007251274666402600312100ustar00rootroot000000000000000‚Ñ0º0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping1 P1 subCA 100101083000Z 301231083000Z /0-0U#0€óÍ?ƒ0ÓÇbÚæÊl¥±¶€Ë0 U0  *†H†÷  ‚á©pêš¡é îXøNÐ ÁÕù€›‹&7·®DÕÈv¶ZUݸ P[6ž7^ÀXO† Ùì•£^âÚ©«p¡‡ö-™GµçoÆN%Å1VèäTY†4¯+ÅSTLïIµoz"¨‹ùwƒøíy¡Uú4Ôïí>Çæ²ñÑ”‚xµ^w,@aõ·¨¹ë*«ÿòá_ÅŠj›kKËËt¿dÆ—š}ölÍHè@ÞX8 'æo1ë"ùí·‰0xÅdÃy¼ÓdvJx”µAv¤Ø;vÔmÕ(üªÞþâcAƒ€ºÂ)¼û/ú{¯ÁÔãqð°Âk«l(‹å˜qò‡ê ³VëúÖcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping1P1subsubCACRL.crl000066400000000000000000000007301274666402600317160ustar00rootroot000000000000000‚Ô0½0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!inhibitPolicyMapping1 P1 subsubCA 100101083000Z 301231083000Z /0-0U#0€>Et¢‹ÒñVŒFfxp$Æ"Áž0 U0  *†H†÷  ‚tÌâ@CÍÑQ+:×yäàù0ó—Xô[æ.ŠQ0ƱÙëblHLýáÆ´u¼ö’ø&<ëÁº~I|ÿ;2zÉOBsаýÚî_;'ñø¢þû¨9WŸ0•¥Ù`ëÎòþVM!F?£T¾ «d‚†­Ê©[ÊÆŸÌ¬TœþøÝ£z–›'$Þ]¨Ò0ƧOì1Å2†ñbŒBØuw%fa iV Ä¥` ›޲,Hz\!(|ÅÒ¯ù³¶· ù¤ ½ÜmÏv‡¸£p›éhÒÔ£ÄÔ¢6o Ç]íûœÑ]D ËU¯ˆ…!mâ|D.ývæc@º) pgÜM>ƒ ù\2^—ù qFöô?Ü4 ­Óv ¼Ö½ÿucH‘¡W¢™÷Ì…$»¸l¤4û}*ß7%6Í%:½¸Ð#Á’˜ßÙôfŽâ‡hK’ ½´ââcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping5subsubCACRL.crl000066400000000000000000000007251274666402600315250ustar00rootroot000000000000000‚Ñ0º0  *†H†÷  0W1 0 UUS10U Test Certificates 20111'0%UinhibitPolicyMapping5 subsubCA 100101083000Z 301231083000Z /0-0U#0€5§ÔáKtNU¨q´B2þɸ0 U0  *†H†÷  ‚m¬¡”}5K*7¢S ¼¨û…Aw˜uD†Š³Ù#°M0ó¨$ËʧívOŸ_loÅ7pÞžªö¢èuF]¦úKĨ〷j¹W¯„'ÑÒ `o\üH¨Vi cE* ˜ ;óŽLV€ÚltÌÚ½ LõaÁÓ6etŸ®à²m)v]gsbª0Ôœcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/inhibitPolicyMapping5subsubsubCACRL.crl000066400000000000000000000007301274666402600322330ustar00rootroot000000000000000‚Ô0½0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!inhibitPolicyMapping5 subsubsubCA 100101083000Z 301231083000Z /0-0U#0€®cË×âÃqãôÎnü5ô›ÒM>Ü0 U0  *†H†÷  ‚J£Ìä0MÅ€ƒròU˜+yCÔŠ—Ý|%G…Ë[ß7aÂh=–}†ŒÊ®©¾‰Û¢ùšôÞ*RÇÑf× 1'1{~1"ˆó–&¸ÿû…–+[<ó]¦›è¼Ršè«ë™-ߣŸˆó•–²$m´Ð¾þ8`«’Glš¼RÅl+µwK!Df[ðý'›‘‘©1[â>Z0±©àƒ“í’ì@Kúg@í€êùä]V‚Ž:XNf1r >DÀ™t’–Ä—zþ ¹¢‘Þã²ä¤¡W5ÍʦWO‹c6Ѻº´ïðW¡ b²£9»ø„x›ñøüf‰1certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/keyUsageCriticalcRLSignFalseCACRL.crl000066400000000000000000000007311274666402600315140ustar00rootroot000000000000000‚Õ0¾0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"keyUsage Critical cRLSign False CA 100101083000Z 301231083000Z /0-0U#0€ÂÊiõ´¯-ôœòUË*0³ÒZI0 U0  *†H†÷  ‚™?S–½Éº‘¸F¹Ø¨KÜ—ÖóÞ©xˆe3™€<©Ì¼ÏDJª:Çu0pñ52ý%DA‘a›ýèê ')Ë\ðnø ǘ’÷¡Å€‹¯ Ì™ø?“ŠޣN)¥ï‡­¡àrÚÈ(l†¨F:]Ì’_F«zìŒ@øêm7N0[®ûR{ 7á 3J‚¬=˜q|Ä:ÍÌ{$ª§kÁóïK – ¯Ÿ¸ì8ïKÞÙ|¹³äêʼnA©tý΢§zŠÚ¬·`7qˆ–*¤33Û#ÍÛI)°l"'™"yÜÎÚ)lÍæŽl‡@ Ê={m±ò2»;‚ü¢ðcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/keyUsageCriticalkeyCertSignFalseCACRL.crl000066400000000000000000000007351274666402600324460ustar00rootroot000000000000000‚Ù0Â0  *†H†÷  0_1 0 UUS10U Test Certificates 20111/0-U&keyUsage Critical keyCertSign False CA 100101083000Z 301231083000Z /0-0U#0€4U gü±ÜÂr ðcéÔ›ðcù0 U0  *†H†÷  ‚wmø¬3Uº Ja‡qfF ¥ì®3ÕÌô·o~Éì¢>ndÙ#®6ô%r_ÉFr©B´RïÙRBl¦ aKÕ³imÑ¿ühøÉ$²´>gÞkoKïîØ¹2Z¦Çp–¦ x‡ãå]5€w7:O*+",_rßb[ Ÿçž·œ÷)2~óÙˆ[ÚðÖ…ÛP¡ƒ“‚ë0ä¤ï€ª~›²è‘Ê`ßvjÈ# dçæ£ÙrÙjÿ†ha‹Ý=Ò“ÁjQ¤ÓtÏY‰ªÌ“9ùxT^Ý-YL;ù$}üzÉ{áØ·ÄJDàDfõÕ±•ú#Êçcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/keyUsageNotCriticalCACRL.crl000066400000000000000000000007171274666402600300040ustar00rootroot000000000000000‚Ë0´0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UkeyUsage Not Critical CA 100101083000Z 301231083000Z /0-0U#0€ÁJÙ´+Åp~ÎŒ;bXå»—+s0 U0  *†H†÷  ‚€®HÆBw»ºQ¦Á( p“à„«:Ëzï;æ¼Gï˜ÌË7% pºáö¡¤5ä6¾bžU@IÁ"Á„IS$1ã¤<¥-âx]c#ëÉ[è¤Á> X©Ïï%ê󭑈ҲÁÕWácô…×R¼ÁÝæâ¢­•‰ã$'UÊò%ú=|´CâF÷:FÎëg¿t‰;`ìµ7‹ °Œ†eÃ’¤ r} êæ“ë#¾UjÛ'¨¤d·P”ƒ“GÎ"§"ØÜûì·S°ZÞ=÷´XÚ*Hšhþ|Šû¿Å0óvæ;v2ýéáÞŸIöcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/keyUsageNotCriticalcRLSignFalseCACRL.crl000066400000000000000000000007351274666402600322010ustar00rootroot000000000000000‚Ù0Â0  *†H†÷  0_1 0 UUS10U Test Certificates 20111/0-U&keyUsage Not Critical cRLSign False CA 100101083000Z 301231083000Z /0-0U#0€ù~R yfDeyÝæCñØ0 U0  *†H†÷  ‚šÜRêÆ×RØ×’Ác/ºØœtœ3ìRÑ”_ßA¾ZÃíš„go¾wZHe%–\‚X¥LkßA Ä„¤ïÔƒ%éŒ8ûJâÔ}7HOÄ)ÆLoç«o`{÷ÝŒâ$…yÁ’Ô2äÁòQ¤clÛCn’÷¥1"úî1v(¯–wJû3êÍ£ÚýVayofQMÕ™t|û®ómNíÑb íYdO$ÚÒlZžàDþEšTþ :ú7£„FPS§\'¾Z½w“5ЧZ»À|±;3¸e‡¡ƒf–I/PlË—8Ѿ›ç¿Âä+ÈË´Ÿ_Üg¼©‰³ÍBëÝt¨1ÆHcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl000066400000000000000000000007411274666402600331240ustar00rootroot000000000000000‚Ý0Æ0  *†H†÷  0c1 0 UUS10U Test Certificates 20111301U*keyUsage Not Critical keyCertSign False CA 100101083000Z 301231083000Z /0-0U#0€²%Ò(0ÐUhnLµÂHóÊ›ò@E0 U0  *†H†÷  ‚´‡Š•}®·²…Ô®–Ê3n>\b…<êõé˜w]m:0Á¡­Z›~]y:“ê¿H¥Ò•öm%T÷³rædp7ß±LNÃfÑÈ9&tŸ,úáñÌ<6<1­­C©Å5¥ŽsÎ _Ã,Ùn™dOJ[aÈÜ4ÓÌ­Úd4K…ÿ5žÕ2â©~Ù£@éÌ%=÷°—ÊLYÏãÐ=@«ê©vÝW;ØM™Z{©©—¿²„X§…tPŸúãöjW=•‚û>òk¯[Lûcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN1CACRL.crl000066400000000000000000000007151274666402600275440ustar00rootroot000000000000000‚É0²0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN1 CA 100101083000Z 301231083000Z /0-0U#0€AxBFÍN¨‚çá9ß÷©À üï†0 U0  *†H†÷  ‚[\_±sµ…à•:'[$kÉA÷§Ì»þ.F­XjfäYó&,¸\àçYduzåMíâ[¦˜¤ÅÎtÑ«Æ,П­øÇ©jÄ É‰Y&¸áR?ó~냃±Òò@€“7Ç®ÜG ë´gúŒÕdïþ¥ÎÎ0ì”[é!Ò…Çc­'²x{4ø¿<Ñ›á $„Ò‡1V6ÝàœÃ)Bú{û- #ç–‘¿ÆÜùþY­R¬À³¿P r=HZcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN1subCA2CRL.crl000066400000000000000000000007551274666402600303440ustar00rootroot000000000000000‚é0Ò0  *†H†÷  0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA2 100101083000Z 301231083000Z /0-0U#0€¢/Xƒ[L•—·îö‡´—àà—0 U0  *†H†÷  ‚È7,¦IÜ¥ôFìëÆw¥[ϳÀŸÜÍéœÂQÕÇËí•Ø¥ÃLO쾋\øþžä%4¤µñ:Âö;ÌrÎL< ö3O¦lçâÕF&"•û|J¢/×o@ŽÒ#ùZ¯Ç‘ ãÀ #îõØèZàO8y<mX 5¯NU>?-ýùy^ƒQÿ‹Ú `ØGÛŸ&Ç¡)A±rd>¹1zëy8’6Óõˆ—è%ÎËR|üá­™'Íj»éF*à¹Ð®£hƒ&u¥Î:ùþÑ«: ÿ5¾€¨¾7kéav›0©¤€f¤áªþª'nÓÅÿ2[çܧäíô–"°f )certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN1subCA3CRL.crl000066400000000000000000000007551274666402600303450ustar00rootroot000000000000000‚é0Ò0  *†H†÷  0o1 0 UUS10U Test Certificates 201110U permittedSubtree11#0!UnameConstraints DN1 subCA3 100101083000Z 301231083000Z /0-0U#0€'IäÙEúl˜”lüí Ã$RmUD0 U0  *†H†÷  ‚¸G®¹ðJõkôRõ³]±uè"˜9Sb´½0õ%$ŽGäPØ»ð¤™d7-¨ß>±°"¡0Ž‚'Ê_8´¶ÌÇD/a²ø2DO&_mx(ˆ9.=Ó¥Ìñ5÷üþyIxÔöð² ÐLOœrm¡àiTyúkGÃÒeÓˆr¬[ ¶©,p½¿=CËV3˜²I®Ø'µäâàÞ6ܬ ´O(_êµ¶Æqö®µ©®¶Ç#zì{Y4)ûÜZHå6I€+ ãnÝ"W¢„’…4ðY”Ã5ÓÅ}[ÈËȇ‘ù¹ñvÉÐÌ`ÒO˜Éû›e¸<÷Œ&‘ƒ¼}j„Ö0˃lZ‹}certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN2CACRL.crl000066400000000000000000000007151274666402600275450ustar00rootroot000000000000000‚É0²0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN2 CA 100101083000Z 301231083000Z /0-0U#0€£WÙ[]³`ök‰Q+‚à s¨{0 U0  *†H†÷  ‚ 2é»VM¨@ÿñü¾ü»È[[È9`ü²EîT‘Ë¿BÝKgÏ97[¼¿š¢£°‡M–QTÚw~¶˜—h\—å/Un;gsširRÌE^ˆË­E™,óÍßíìg…æbœ×SëS?hª„‰•Bq„ÚœvÄ’3š£¤s…V±¨¬‹ÓÄ„M“aÁ? 3±sYR³‚²ó#7£.ÞÝü2r„Íþàa+ˆU»¦Îp•q .È Kiáý›7É{§SÂ0Ÿ6lê µ½"PÅiõUEz†“ð9ý©ePí–Ã]RÙÁ¥±j|½ˆ{ÁãJ‚¹Ÿ‰»³ü7¨øcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN3CACRL.crl000066400000000000000000000007151274666402600275460ustar00rootroot000000000000000‚É0²0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN3 CA 100101083000Z 301231083000Z /0-0U#0€Ü[¾Ç7Y¤Š@t| EDëéCˆŽ÷007Ð9ãÒG¤î¯ö¬ÞQÚ›pKXÔò-ÌŸ¿ÆMeƒyí>h¤P0ø6dqžG};Æ-”ÙÚó+øG|¾certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN3subCA1CRL.crl000066400000000000000000000007211274666402600303360ustar00rootroot000000000000000‚Í0¶0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints DN3 subCA1 100101083000Z 301231083000Z /0-0U#0€€¼Ç.÷Žñ8{ô5ëÝéXÆÿ0å#KažHn€ó›\d†; ÌØ`QÙ;¡°¹hî˜ôsâ©ß¡Š³2c¯Ís©{CœKH„%:޲Ïþ?šÒCÔ@ЦÑ'ò ҙȊn]¹¡Ö—%Q*ýò$@»Gþ•ªÃ‚<<²q¯Í?RvÞ3wï0MÌa JµvåšÎmÁÍл‰H8uÕQ®›ä8p¼ÅÌÙVâZ •Á òÀ‡.þlG´`òÎyÏsÀ%÷‘+$ª’m<ŽjF eéýoññ°ì|¿certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN3subCA2CRL.crl000066400000000000000000000007211274666402600303370ustar00rootroot000000000000000‚Í0¶0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints DN3 subCA2 100101083000Z 301231083000Z /0-0U#0€Ìíj(~Þdêˆ*ìu¿¥.g0 U0  *†H†÷  ‚RA¶½<'ŒÞÜ'Ÿõå°™_4µ'Ï ‹Y’3M¹¦röŒß0µvêYßéÔ±®%ä²öo*dod UTœmf‰H‹°MŽL´¢Â’Ú@HÀç$Р*/t¼#E;Ö øƒßð:1Z*W,îÀŒ§Y™~WÖ ?•[ƒ¦çΧꛌØhbsçy}ÿ6)Æ¿ÑÞ¨ý¬ªN²‘¼ÑÕï˜ÃÂkä¬ñ¬"”_.îi—@Îþ‘mOWìÁ-wV¨ÅšÆËKBe¢Áë¥Lxâ S.¾‹än3ýÍõ+ünõ g…Ò.©ëÈì@¤i¿ïé^—Ë‚ÜgîøÃcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN4CACRL.crl000066400000000000000000000007151274666402600275470ustar00rootroot000000000000000‚É0²0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN4 CA 100101083000Z 301231083000Z /0-0U#0€lI6­.X‰6QA;TR&$ÓÊu0 U0  *†H†÷  ‚~]néQaêV¥Å] ánô'ê´çÃõSùÕ°ã îÎ:¿æá̬ ¬Š/KçÆå¦ #yâ3¾c'^ÙHi™j¹†3F³!š#G[×Ùi6íòxñ¿pßð‚Ϋ0‡ÃU™2Ò ÉS7µ8÷lj(ôS§9?Íè#­lʲNΚӯ…Ê­ÀËyz5â—Ø›F È(6ÜΡš@ëÓj3Ò÷EbqÇ_›7~— xôƒ¦“\FDq*P/]*Obj÷[Tylî—nF½µS¶zdw¡Çˆ¼„/=É1š(°÷?570*Þà¡ÞÆLM¨certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDN5CACRL.crl000066400000000000000000000007151274666402600275500ustar00rootroot000000000000000‚É0²0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UnameConstraints DN5 CA 100101083000Z 301231083000Z /0-0U#0€ºŸ Ê9œNwZëû•¬Ó§J]'0 U0  *†H†÷  ‚„æf/eËO:¯Ì£iF,™­õ‚°Ê÷“Sê î‰Do¿´Ð5è;…#WVãÿˆ>Ñ+ƒA#j•[ƒ= ?uðî\Í ?^ $¸ÕNM‡ê!ñá½B uW_)¸ùúT·îØY›NZ‹ëå"%>ÖͪÌÑÖ S-¢ò"Dõ4·ZSŠ“fcˆ`+–Ež‡A}ÄpáÝôRœ'GÌâöò&ÓŽìauëÍ…‹ºLÅcª¿¹üâ7³‘y+.»MX fô¸±§¥ºá)Bþ WE+û½é–p/¤ý6I'i`©RòÊ• vÓèæ:ïËñV»ÅÅÊø nAcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDNS1CACRL.crl000066400000000000000000000007161274666402600276700ustar00rootroot000000000000000‚Ê0³0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS1 CA 100101083000Z 301231083000Z /0-0U#0€±ªðãÏÌÒ§‰¦ƒÝÿnÚãI0 U0  *†H†÷  ‚5èk#~ M4ź—Ähð<“˜×ä9õ(vMm%+™5 “Üÿ3Xðò±®*ZBЧUCÅ­ŒVaÈûU:5{ïoäA¿RªÌ~êÝ.ãíy^Iµv€€BÅtœœo@Y%`ׇÌ}L*_‡õ+†ÌáaÅ!ÕÛÄ·w6¼s´õÞòÇô»éý3„½7cµ°gÒL(› C W‰wÐÁ5qNå‹×È0TÞë ˜sL“L+‹Zè'5 R¹Ø-Š1ÔïùÛ'u’D7‚·-™À\%oh…®certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsDNS2CACRL.crl000066400000000000000000000007161274666402600276710ustar00rootroot000000000000000‚Ê0³0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints DNS2 CA 100101083000Z 301231083000Z /0-0U#0€FHœB Ž]SpØàÁÉ5 0 U0  *†H†÷  ‚&†E‹8ìÍ@ òå»ï‚ þ½€ÕÚLÚÀnŒVÂz[— ¤þ¤G ‰Å·6Úø‰ÂèFVò£êÌ÷‰¦2%ºí6OnDE&¦yFÇCM—èß¶Tœ<:•a~7û)…ÂÞ“º"‚ön >ùf#RBÕ†ZfH²^}iî3WQ´‹#2¢^Ö†ÃáÎÄ#ò”@WsŸ ´zw/ÅãpG—Ï«]\Òéÿ¾~)YÙfG@®÷™À7—%TÛÌåo?Y™Ì¦àØr:M} ±Ô±ÅÖ;…Qܰ¡¦ýÏÅ:ƒçSb‡Ø¿ÇF~´¤7;~œïa!OY“üÚpò£‹•9ƒ)€!Ô ŽÌŠnw–ä &certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsRFC822CA2CRL.crl000066400000000000000000000007211274666402600301070ustar00rootroot000000000000000‚Í0¶0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA2 100101083000Z 301231083000Z /0-0U#0€Q€ÍúIrH<íN ÎÎ@ep 0 U0  *†H†÷  ‚0ðiEj;•¨O Ä8…¯7°“Ê%MçlÎ#÷¨í¸X¶±Wun`s_&\ÞyW:q8˜’Hƒùø‰¼]ÈÛQœ(ÖL6ô¦çBåCEk³s¡¶¤½péè1Ðí2ÙÀ'Ï}¬§ÜÎ$XB’äéÎÞŽ¸ZýÕ”¯ÎõQ BžÉ5Mórg]ƒ~#bøÓÂWÄblÃs̃\ZâýÚÁ&ÓOü¿®†”¤ÿg£Ýº¹½Ç§`ðc¸‹hçK¶pE>7E.æS<†%爽îh@0>¥ŽdÕ I˜©ÉÓŠy‹/QS@¥^e·DKãt%báýcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsRFC822CA3CRL.crl000066400000000000000000000007211274666402600301100ustar00rootroot000000000000000‚Í0¶0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UnameConstraints RFC822 CA3 100101083000Z 301231083000Z /0-0U#0€šº9MÚ!u¯êAÃL—è06}±ä(“­åY [Šé†ýozæÙÌ\xŠ¥¾¤ &*~DÏÈ¿z6=ƒ9ãóYô@ërØcÀy±Žý[Kÿš ¥ÓËìŽ×½certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsURI1CACRL.crl000066400000000000000000000007161274666402600277030ustar00rootroot000000000000000‚Ê0³0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints URI1 CA 100101083000Z 301231083000Z /0-0U#0€ú(­AÞ*hÈ#?&Þ0 U0  *†H†÷  ‚+ÜH¤IV‘d ¯Óð¦/ü¬-çfšÂ`^);39h/zŠ3 GÝë蕆ü²BìíX(8…ɪª-¹"ô¬k^]à;KObçÅbÒ³ˆšÃQÕ‹íà°Ò‡3)y5ì¶5‚|ÉaZpU º­ À`õIk\‹ÝSë8•w3}Þ²/b­«?Õþ)Õ$*5€{¥i Q&ú®1?1¢ü«tìÒD 3žÚ#¥ªœ"ÛFQÉw§nŽ®ó ¡Äßg\jäl‹ÜBj¤ÉÀ°êÆ‹™#TxU„Bô@"êü4waf±4‚òÆiæÄMÖ3¼6WU2Æ Xñ&wgÙø_$¦certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/nameConstraintsURI2CACRL.crl000066400000000000000000000007161274666402600277040ustar00rootroot000000000000000‚Ê0³0  *†H†÷  0P1 0 UUS10U Test Certificates 20111 0UnameConstraints URI2 CA 100101083000Z 301231083000Z /0-0U#0€Më‰qßð²úv:X±º`ÝŒÓÃ0 U0  *†H†÷  ‚dôá[ ÙÒXΨ /ƒ™ö=>~0 v.üBåEJkÏ<è··è:³ã0Ù°‹’#> íÒ%q–¯žbªÈ7š¿6¡]Ž]pÑKÍŠ÷.<ÈØ¶G`ásÉ]ÇÆ ùÊmo yîY£ëéiRÅÑF#f>Û¤^$íEC.¾ :ŽÛ¿• É3Íì43epÇ™fO_ã¡í¯äÂú…¥1æ©kï¶-a-©ti­K'$Mo˜t×['*³¨kÃK7¡pwöú”Ýþ¼¶à¹ÌJ[Ñ/BTlû˜Ù[E”™0U#0€Mþö-¼µPMß™zm3pN0Uÿ0…ÿ0 U0  *†H†÷  ‚‚ËP;–mz„QWîb¢šâqD’*ª¨»a6 I$·Vc7þe¿˜tøI¬’LnÈ+V4ƒɳAÅ÷ƒ¸dÜ8*È—†Ð.yÆ4eJCÀ.#µeUDæüip“£a,ð /1U”®Ãý:Ö¨éCŠÙøÀÙ"Öu2ÿnMajƒ²¢Hv0œÝ?W¬Ys$=£KŽí1ÞÈƘôú‘ä!Ž O³m½"û¥×~u>ëÇ­ÌQq …¯¿ðHœU[1x¾Úð[«j=À…IsFݧUИ‰nYQÑ aŽ táð7²c-B­‘.@Áhdkû2ø(ªW°17ÁՉΠãcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/onlyContainsCACertsCACRL.crl000066400000000000000000000007361274666402600277610ustar00rootroot000000000000000‚Ú0Ã0  *†H†÷  0O1 0 UUS10U Test Certificates 201110UonlyContainsCACerts CA 100101083000Z 301231083000Z @0>0U#0€%8îÊ-uz[MÔÀ’ˆ"ÇlT0Uÿ0‚ÿ0 U0  *†H†÷  ‚0yåÁ|T"ýïñŸ£ðé‹t‚†-kœ”  E#beÉì!:ñì]bsÏ~ 0U#0€¼©ÜÍþ–ˆ}µžO™Þ$Ò0Uÿ0ÿ0 U0  *†H†÷  ‚‡[±LûéŸGéówö=ñ§ RƒŒ6”„¥4ú\»0~Ãk4ÛÖÏ#‹l€ªL¯jűݦñ½“à9¤øÞü¾gI{§~é *°ÞCpVQæUË5ó(›É4KOëézì?=]Nîßw¦·±G`~m;ãø|×"•@’Ÿ°O‡÷ —£…ñ–ó}ÿ~ûÙMZÙT×{oQÜìXÎÞvù‚PÂb¡•zíû²½êOCtòL\lÉš’\GϤ wô¾f»h|0ÙWsô¶¸Nk2)B_MÚzб„9îÞLPÜm”©¼0}åÍöÂ$¶çáƒñƸX7æÞeecertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/onlySomeReasonsCA1compromiseCRL.crl000066400000000000000000000010001274666402600313740ustar00rootroot000000000000000‚ü0å0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA1 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  A0?0U#0€PhÑ A'‡ç N·xVûŽîq0Uÿ0ƒ`0 U0  *†H†÷  ‚a‚é¹å{ôb!y ¸oZš £ˆÄsCÑ?/LÜ:|¤šƒÔ^æÜ¸s[CÀ™CtQc~Žó`K"b2Çãe´7ç»mÓ2ïõvÙÄu+i?¹ ¯²gÆ91¿ÎnÚÐ{tBÓ:«öëÕOo´s´TÉ^!¢ƒýX5vPŒÿõ¶º]öȤìI áFkº?h[;€¼¬,1ƒ€4o Q×:ßÕ¶†%Wiþ~|ÏnA 0Ä:›@s)f™ˆb –Ð:Þyø^ýïõfA´ƒÊfDû=áy“§æV׎ð-q¸uÎ *žDï(‹ÌÔò²?uÜ~οcQâYBWs3ÕA°ê¶sÇcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/onlySomeReasonsCA1otherreasonsCRL.crl000066400000000000000000000010011274666402600317340ustar00rootroot000000000000000‚ý0æ0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA1 100101083001Z 301231083000Z0"0  100101083000Z0 0 U  B0@0U#0€PhÑ A'‡ç N·xVûŽîq0Uÿ0ƒŸ€0 U0  *†H†÷  ‚ßÓÄ…[‹}‚ÝW+”= ¥+ÍfΛ0ÁÆÕ-$cŽu¥ÖZðUÎ)•ÀUO`ŠDòá5 êÁ(ÊÈ„½iO6.ŠBðiÄeTÕ›6jbaÐÉÄò®V_¿ƒòTúóèOS¡;ó÷ðò™),Á\›ñŠgtjßQ¼ž+¸ÄtöôE·üc}±@¿c‡F=ÄÍ%ÍΑÊËîÝX)üýçEuz©MopvÞƒ“!ý‰ÜÞœhé ãñl$ñMšˆ;Ê©zÏöü2[u ée"ŒÝ*†Í:†žþÒž×YÁ;ÿÖ‡˜uºIéQ…LÊ—ÅI txm¯“ŸØŒ‘ ÛŽsyþhcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/onlySomeReasonsCA2CRL1.crl000066400000000000000000000007341274666402600273750ustar00rootroot000000000000000‚Ø0Á0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA2 100101083000Z 301231083000Z A0?0U#0€`cßÒ#¤)ÖA¤¬Ê†y˜¦eH®0Uÿ0ƒ0 U0  *†H†÷  ‚NØ¿IlÙgÛ¾Ê@­SGí\-r¥Ž¢»!bzì„Ó¾S-·>ÕB'<´ßÝÔ+̆]›?¿­q±’À&Z°’£¨J,“•`_©— MgF÷—·ÈvªcI„Ž¥ù¬õ€4{„.TOœQ,ô”ƒnî 9Ù~m?™<4Ûè_0ü²´“¤ZBìûšKƒ«òB·©­ÿ ŒÝ´ ©9CëÏ¥„šÌ¢Æ³îcR¹žýô*D t3&O‘F•Ñhïe˜À)ÓéØÝGyÝžÀaIÖßܵꜩ:‹¿TÔ˜Ïj ɼaßæ‚EPÚ2dͧÿ²]certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/onlySomeReasonsCA2CRL2.crl000066400000000000000000000007341274666402600273760ustar00rootroot000000000000000‚Ø0Á0  *†H†÷  0L1 0 UUS10U Test Certificates 201110UonlySomeReasons CA2 100101083001Z 301231083000Z A0?0U#0€`cßÒ#¤)ÖA¤¬Ê†y˜¦eH®0Uÿ0ƒ0 U0  *†H†÷  ‚Žü·„Ü"¥‚‡kÔÈÊ:õgéjNÔ‚"àvì(®`<0&{Ð? ¯ä”6h¹üfIIã'âŽç!9b$ModØ+Ù/^àZ&‰ìqiõÑŸzÈq5Ñ™ª¨‚kº4ÚkÓûè¨Z¢ð‚¡iIP ‚9!} <£åòr%… Åz8 V,,& x4­æù€wQËúx=†+ Â5ËþS©×¥®30.l¢ç šòS€µ /WÌ„Á½Iâ\ëL;èXý¬F¢9&üƒJ\بKç5ª¾¯í‘lT%©ÁY:O‡—yFˆí£û®áó†ávÐ-.–TY”"O&certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/onlySomeReasonsCA3compromiseCRL.crl000066400000000000000000000011011274666402600314000ustar00rootroot000000000000000‚=0‚%0  *†H†÷  0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA3 100101083000Z 301231083000Z ¤0¡0U#0€-$·—‡,îÚ¾Þ—„¯ ¾k0rUÿh0f ` ^¤\0Z1 0 UUS10U Test Certificates 201110U onlySomeReasons CA31 0 UCRLƒ`0 U0  *†H†÷  ‚uZö¶6ßæ×ÀÌÁ" )ÙE˜r±%à«ÃÜ:.Ñ4t‘  ¶¨}Ù¬p\ÚäK T*÷Ð Œå›ùv?aÆŽýº ¶e¨|M€²ùÇ$¶¦O ÉòxhX0‚&0  *†H†÷  0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA3 100101083001Z 301231083000Z ¥0¢0U#0€-$·—‡,îÚ¾Þ—„¯ ¾k0sUÿi0g ` ^¤\0Z1 0 UUS10U Test Certificates 201110U onlySomeReasons CA31 0 UCRLƒŸ€0 U0  *†H†÷  ‚MönÁTm²ª6¤ˆî‚‡ƒÔ»ö][çœá“Ô·ýÚMÿ!°Ø2iÚpc²ÄŸÊ¨Å–Õ_°Œà©xã´c&®ÞýÙŽ37Ê-^RÆ·ˆƒh3—F?š ªa³k‹ÉâG*mþð"º¥°Hïsdl&¼ï"Þ¯! `ZïEhÃþù)ÊH¨¬¬Üа`O='¬úÍ‘GÚŽu·gßÈ;‡sÚÆíO|¿²üžÐ« ‡í°eÍíSœì½ 7§è“i¢¸ÝfK@—2À‘%+|;˜÷<`¿I*'®+¥üM]n™æñÐ=J>h*(Ê|Tjÿèàp¥X<certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/onlySomeReasonsCA4compromiseCRL.crl000066400000000000000000000011461274666402600314120ustar00rootroot000000000000000‚b0‚J0  *†H†÷  0L1 0 UUS10U Test Certificates 201110U onlySomeReasons CA4 100101083000Z 301231083000Z0"0  100101083000Z0 0 U  ¥0¢0U#0€¾fÜ ;öÓˆ4‘S& hnÉ0sUÿi0g a _¤]0[1 0 UUS10U Test Certificates 201110U onlySomeReasons CA41 0 UCRL1ƒ`0 U0  *†H†÷  ‚H7KGnÇ3ÅÃïéïdL”t}RÚ¿ÙE^»#XÎP±¨ôxç]46¯üÄ.ñÔ/bBVí(»p”Öeƒà8¨·ÀH_ꤕÙf<5o³CÆ]“ìî"Á?¶xï°»T—Ý÷—ê>EG:ߣtuL,²IŽVð!Ë.`çÌ|Ùu9¶î¶”¤jâÜQ2ZGhÓôêôŒE[™Vê]C•«ð[¿„Ê”åöÑ’Ixrô¡µ_C%üœLG"¬ïhQƒB q¢ÔDk/y¥S*¿Ð =¤ª³ZWwlÖ¥vy}·ÓÂgé=̯ÏYKÆã¶Na@ÜqE¡UH÷ÙÑ¾Š…Vk¯G"§IÇÆµúKâ㙞&ÁÍ}£•·&öqyØvæ"J·fئ"-ÏK «y6ôJU»ý•ø5ÿŸœ&guW=uj¾äûwŠ£‘ƒÏCè|ÔÔaUñëK{­FØ“~va±«—èÉ»dd®ˆ×‚Ãê©´R'œéŸ^c)•ƒêìÝ‘ ¤PHGP¤@~iÉ2Ð+øÏ™­f«©-ÏxGŒÑøCZñ•øÜ¼¼Lð|’cØÜåíøüVJC[ø6 Ã`Ü2¹Š½certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint0CACRL.crl000066400000000000000000000007141274666402600276100ustar00rootroot000000000000000‚È0±0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint0 CA 100101083000Z 301231083000Z /0-0U#0€›+²J<ÅnPÉ"½cÎ ñŒ=ú0 U0  *†H†÷  ‚ ³j섺2ªÊwÓd!‡`ÐçùÐ ·ÁG= 1Î8K½%œÜ^è÷|v-í÷@¡°2®å‚KÈöµ2!Ø7ަ šæ™6ŠRÀIˆ!2ö HTHf ã`^ @ªG/jÀÌŠéVçXº;ªC{àRñ¯Xð^×mÂeë`t±[p…6M;õÝ®1RU?gæWõ³|N$–°ócjXìá¤ü$ÈÑt0ÄñÀªv¨?,!ö‹/Ç#"¨»î£“z’˜ûò€Åß°Ä/Ô¹/U)HÛZÐ> º·2-u(Œßi« 94k9+9Ú÷–w0Qû’’ì’Šš„³@certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint0subCA2CRL.crl000066400000000000000000000007201274666402600304010ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint0 subCA2 100101083000Z 301231083000Z /0-0U#0€Æ *û¸é>h`zǗγXQ{vÞ0 U0  *†H†÷  ‚š„Ç&SƒÃ`‚{HÜFÒ %#±îÇ~öÚAͶÉü«'¨+ü›cÉDd<¥'ïíF\ ÚûÀôSv²ÈÒ jfr·àÔ%[Õ~¹‡;®³è¸YÔ1Þx3“[g™ï|%ª0iÝ]=xÚ_ô¹akþ\²ÎIgà/èDZ—®ŽF/°îŸØ£(Š/US ×¢iöNÝÁ¡Eî-ýõ+gFoú¬Cküÿ¯tRÑ?ÅÎÀl.ÙVã.ªÙº"c*ež® ˜H|­J{‹Ë|FRÿ¤,ßÝȼ}¢}6ÿ/Þd¼Æ ·ÇžúÑÌ*certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint0subCACRL.crl000066400000000000000000000007171274666402600303250ustar00rootroot000000000000000‚Ë0´0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint0 subCA 100101083000Z 301231083000Z /0-0U#0€bg}Ò7ÅrÐ޵ʣs^0 U0  *†H†÷  ‚œdFÖG~M–2ÿ ¨>‡dQsìÏÖ™/ŸŽ¬JB_ÅûS!*ùz`óxÖÜø5°ð`ƒ™ÿY1ßV€ûG½ÎAiÎÎÛŽ²#?“#ƒ=ó>ß “ ÅÒ%m­ Ó¡Ÿ¸Wܾ´™ãÚѧÞvÍäð–‚²0âG–¦ž¨\ åéúæ9ç5¶Áä5êºJi†Ï×x?G×ÈfødLRÃÔQ€®1­ôqõ÷·Ÿs##DÕ ùLé¸&ˆ3ñ+<÷SÄ&ôê7Ïàw9î^¶2ti*[Çy8mîqvÏyYS³ÜL&Y¸³~!ŃˆÝyîÚK݈‡qÅ©Ãhñcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint1CACRL.crl000066400000000000000000000007141274666402600276110ustar00rootroot000000000000000‚È0±0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint1 CA 100101083000Z 301231083000Z /0-0U#0€óäq`ÿÞ&…3~üÁGgúÁ0 U0  *†H†÷  ‚aAÀÜÔAªŽ !ÙŨ±d—æ Ú¦8¤_Ø£¢öøªq„ëæÀõTr2l7:Å&ûQºœýpbƒWykMßgà5®ÂÑLJ¶˜T‚nðT@e°v<(÷/•_]T_Ú‰Øa7ZZü¨¨ë6ÀÇþ€ëîÔ)›s&ýÌ¥ê{”A„ o"!Ù4óá3¤Úæh¾)koµ%*óY|yáäg@IOZc›D-¢Ó<û ¡‘1«?¢•_Æ#y.ìˆm•eí§T"1RJÄši—³‡†Â°®´Ôõ´½WNù²iŒ[ÈED ǨœoØct‰certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint1subCACRL.crl000066400000000000000000000007171274666402600303260ustar00rootroot000000000000000‚Ë0´0  *†H†÷  0Q1 0 UUS10U Test Certificates 20111!0UpathLenConstraint1 subCA 100101083000Z 301231083000Z /0-0U#0€å™–µÇ}UB­ŽÇ%öͬy0 U0  *†H†÷  ‚EõG'›>,+©}¢ ÖG=Ø+UÅ–}–EËÑéãçèC¥¦-:v /]BªªbbÔ“Æ( ú‡Ôp^‹Ê*´4´`B=‘|ÿ ‘äëFÜÀ«ˆÉS™bΜÛì{¶.ñ¡‹ÆTŽ è1W¿ŽpŸû=}ɶ´ÔÚ{O^c£ø/p ¤ß™ßr³±pí‚ÉÞo¶¨„8®Ã"ƒYéh.Ve¿:¡gùB®ë˜¥Ðja­N£ZÀŸB¦:{Z•§ÒD÷¦€˜ø=oµ5µÙsè”-wqètüÄàõí;*/OŠßR™“›E›r™:¸É#ܘ»¾kY„/certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint6CACRL.crl000066400000000000000000000007141274666402600276160ustar00rootroot000000000000000‚È0±0  *†H†÷  0N1 0 UUS10U Test Certificates 201110UpathLenConstraint6 CA 100101083000Z 301231083000Z /0-0U#0€¯¼…®þL®á—#ˆÈ¥±` ºNØ0 U0  *†H†÷  ‚˜w–ä±ûz$ÿhPtb§x•ÀÏœùØqÍX óú' ­/(°w§ì#’Ðaù¥àÖ`‘99Õ u´Ÿ¦ÄÑ#­Ë¶aþG#F×KõËù%u¢øÉVnìÍ×Gœ{¼¥·å®­ÅãüÛÔ:f™ƒèDžÿ3€€£ÆwbªÓå@øêü äû+˜ÀRå·ü„‘î¶P<Ñõ¼cˆpT,/' ³a“”O5åòÊM 32pý¦É|p7ÎÚŒ ï¶ìC.›d#%e¿#'bwdÌdmÿԤŇ*Ù•ÚºyÀÆJ:o/詟‘Õ­0ù%˾7ôEcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint6subCA0CRL.crl000066400000000000000000000007201274666402600304050ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint6 subCA0 100101083000Z 301231083000Z /0-0U#0€Ïvvƒs$Ç£mg|ëRÀÔÔíH0 U0  *†H†÷  ‚\¨ …¿ýûîT3[É£‘ÀþykÌQÎ|]·Dl§»f9d>`SIÍöƒÁŠdËðel¢¡ûgÊáb¢rÈVbr+Íçî²£¥­õîØÎµ(´ÌörLÒú†{HÃZ ÷Bnš2a«4OÛâ#ç ¬ùoV4UžT6¹èåñæ‡üá< ñ²±N(5 .&޹7ñ_ùÅRÒ.'\þÓÏSÎó[ž¨Ìü’iùã¬C:†«X-û²ò˜Ù)Eî’™éîtaw¬ŸìK9ŽÓ Å8Ó¾F :ŽÉòŒ?Z㛾jT —œQFUõwwÒ†¹âV¬äƒÃÎÇ)7ÑÀûÂõ:„öcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint6subCA4CRL.crl000066400000000000000000000007201274666402600304110ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UpathLenConstraint6 subCA4 100101083000Z 301231083000Z /0-0U#0€I…ÛKûcÙ™(´ zžZw0 U0  *†H†÷  ‚·”¯$ÁLx1¨þÇe†M6 ÿçâc/ ×Î4õøÛèÔrùÆf}( “I‰Ÿw?ª˜}õ#¥ YNvÕ«eBE£ðéN²&N- )K©¦µmX¸›&Û.?† ûËeù): ÑðæqU/Îå¨Ì7ðGÿm蕟ã5“á&[5Ô3ç´ó•«^Ï„ê̼¿¼œ#,á™{ÓJÃq ¹0ÆL`øæ1äRAš'$øÉäa%~'Dß b:X4:?ß^6ùr šâä~° ˜:_A3:Eõ[:¸Iì[¦˜*ôñSðK¬Õ… ŸÅ­]U{,|\›§certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint6subsubCA00CRL.crl000066400000000000000000000007241274666402600312030ustar00rootroot000000000000000‚Ð0¹0  *†H†÷  0V1 0 UUS10U Test Certificates 20111&0$UpathLenConstraint6 subsubCA00 100101083000Z 301231083000Z /0-0U#0€º¹âˆ÷ÔY%Šã)ßO 8Ýqt‚0 U0  *†H†÷  ‚½¶9=×&â;öy†lŒc s쵑Ýqs\H]'CtÎIGá •»ö⸀6w2ÈBÕƒ×Wç«xŸJƒÐΗ¿NÞçÆÔ¸å¬ÔÆ÷[ºOÃ[³éI”Ž+‡z…oÕ‘¶+þfç6uŽÅ³dž/ˆfðüXmq¸¹sÐDma¨–²¬ÐÕ^"ÈP—²Ž ?ytˆŸÛ Õ‚I˳ƒˆ!:D±š^Í:à2ƒuòeÜû…“…ldÑìl$bÔ² ræâ ÿÄ—‚S§èS]ùvùÎJׂQÝ%º±õ%çP_׎݈£ wÐï=£«ïF² ’ð§™sµäªd¹Y@3aÐädüÉÈ9…±r!^•'¤×Ü©…tÿä"%sófßÞ;ΧÍk‘?sk7C|Iýbbä¡›Ã4¾`j‚À¼Þ4âêS ªg™ÀÇÞJ;“tΔ#»#·úŒJz Q°ÄíL‰ Ýåbï|b–Œå%x/ȹóñ¤,°h«K,íxk‚¾ C•·›÷3V刑K†ÖC%.âÿLÛ»ÿáö„ï’ 3­0×Àà>"&4;0íU[hô6¬,Š•‡Í¾‘¬Rü±†IsmwýNâ¤Mx£certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint6subsubsubCA11XCRL.crl000066400000000000000000000007301274666402600320440ustar00rootroot000000000000000‚Ô0½0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!pathLenConstraint6 subsubsubCA11X 100101083000Z 301231083000Z /0-0U#0€ƒÚ¸µÆÈ‹|‹?ír%â¯ê0 U0  *†H†÷  ‚˜¬ZBç+\§€ãÍÂ!fÈÿLo{v&“!–…u†3çi6>® Ö° nžØ8”ù†æ}RG”[zp¶)¨ZÁδbÎ4ôÌü aÈS$v4¢ŒÎ®šåæÖ7ËË­‰ÂËÉ8™å®«Œí hqØ?8—ç¤ÆÌïS›§"ú9S¬ìËû£üd‘½Dy5ÊØ+žKv#ý¨šÍð^kÀâ¶"ŒÈÆSÒ{5àÉŸ}ÆÑO?GO9ú4Úƒêa¼6žfyˆ+yPgðåuS)+òâ¿m2s³Ü%=¥(iuyvf‰žÓ,et(•”YrÖŽ¿¦µžcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pathLenConstraint6subsubsubCA41XCRL.crl000066400000000000000000000007301274666402600320470ustar00rootroot000000000000000‚Ô0½0  *†H†÷  0Z1 0 UUS10U Test Certificates 20111*0(U!pathLenConstraint6 subsubsubCA41X 100101083000Z 301231083000Z /0-0U#0€¡í¢ó5T¥Ÿ¼cæGjS$lJ r,0 U0  *†H†÷  ‚Ù½wP9r¤ÉI·JKø)øÀ$; :¬Ÿ—T ^=¼2®7bRÛr†¢½m2/î8Îé›ÓfJ¯‹õ©Þí?” >ûþ iC·#Ç)­÷ˆî•_öKU?¯Ì ¹O˯¨daCÆ­‚­‚Öv”–Ùóò5×¢ÔÁkÓ^’´>Ÿ¿Z¼ö€jhË?µ¤ž¬ì®ÈT=ÿïë‹Ý‚²ä²YýUÂôùiÍNvÜCnÌ%t˜Ôàů¤>gHÍI,{®‚e´[Qm["+"H6\šŠ„2 N‹±v|&Å~1±³‹Zx²†à&dcÆ vÄK%8Y0(ˆ)EõôÕ>ecertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/pre2000CRLnextUpdateCACRL.crl000066400000000000000000000007201274666402600275600ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 Upre2000 CRL nextUpdate CA 980101120100Z 990101120100Z /0-0U#0€¨Gœa€h(±Bš)Œæ()’Ì0 U0  *†H†÷  ‚^š]¼1ÊlkÑ1Uتjù¿;•Q"4v1~Ꚉž€æ“u÷)*["U…FŸÊM>ݬrØòäåw'É)|è–^ÿpuOZ=Û¸cüF7²Nè êp”å? ¸aþaÅ(!•ã'ŽÙôq­;7JÜ[;ò¶°mtŸ/ *Aÿú+†¤®¯jzÏM£«X\Ä ·ow´÷Ú«$9»oZ Ú±<¬ò˜,x’šH~ô¼mÎÿþXä{aà`ø;ï ,/¶®°8 õ"A=»m¢3™Ïzš¬¿)⥑ËBU³UmÊàHéOy¾ž{“G. oEù¤Fµ)certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy0CACRL.crl000066400000000000000000000007201274666402600305030ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy0 CA 100101083000Z 301231083000Z /0-0U#0€¹ìߺR"¸¸¾j÷¢Õ' Ög50 U0  *†H†÷  ‚JÙjùÄÉ8‡÷³Ð°{Xk¢$ 3=õiÔœúµÊSœn@,OZ²Fî±zìÃÅG!÷æñ°]è”]pý§´¶K1DæÉDulïZ«ÊÔóBƒYXƒÒtøt©î¸©ðSÑ ð7à´h^ÇñƒPàiù¦Z?­’Û¥¾RµPjuÍé°K]™°ÿû2û|Ä8;sSêí˵ Rá/‘¨mv)™%”ªfæ™@OÉ+é&:$²$ò Ø“'Hx Ôûcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy0subsubCACRL.crl000066400000000000000000000007261274666402600317350ustar00rootroot000000000000000‚Ò0»0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy0 subsubCA 100101083000Z 301231083000Z /0-0U#0€ëØ—zz#5äÏ—$'"Ìg§VI0 U0  *†H†÷  ‚6ˆ²HŽu?ù}8°ñàÌDŽç ×ÚE*Jü»ÒB¹¶·´˜¹Ý¦zïFD#j ma¹ÚüRâ³"»¥êïÐÏXºÝ)ÍñûTñÿtˆ‚§°th×Åž±~ × žV[aŸÁçQæ_…»ý,ÏGKsx6» ´¾µ½%*+u}µ§îæÀ$iø[K‹¼éDQ»8Š)uåeZUëía_+ “ÚkUær|•í~.,JPdi6é 5_­Çù£…'¡ªoøÎ@óújä‚GúKq#‡Àè+—fª3«ðF±/Õ¬õZÅC”.Ä;ðE5ÌßcãN‘¥îcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy0subsubsubCACRL.crl000066400000000000000000000007311274666402600324430ustar00rootroot000000000000000‚Õ0¾0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy0 subsubsubCA 100101083000Z 301231083000Z /0-0U#0€µÛÖÈ /ZAÇx£D‰ÚÎ.kº0 U0  *†H†÷  ‚(W[¹¯7Zëçö5gYþjÈWÁGz›#¦€NZb—Ç¿Eô£ÎCOÙ*Ê„h»(;2~ÅèË”j|1Ã[î¼qÝ>=%›ØD-¢ÆkSõÓuË_O¿“™Ÿ‹JùF*Ïy;¬WÆí]’Å    PFå_#üÆ”²´-ë !|TB2¹Œ@p¯Ë•bp+Ÿß“˜Õç`h„]ì§zNv¢ ~Bš*­rl¹ªÒŠ«ü§AÌÒÞ¸o`‰¿ºE‡0t~ ]qkçlÙÇ-™ñÓ{9` NÉ"ìœß­þOÈíÕº­ê!‚ñuÁV‹óyöcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy10CACRL.crl000066400000000000000000000007211274666402600305650ustar00rootroot000000000000000‚Í0¶0  *†H†÷  0S1 0 UUS10U Test Certificates 20111#0!UrequireExplicitPolicy10 CA 100101083000Z 301231083000Z /0-0U#0€óLÑ_Õ€Góø4,ä˜ÏkŸ0 U0  *†H†÷  ‚ 0ãëå¹B_]¿Âj‹(ár­ÂçBÊ4ÅyÖvr‹¾)ÖRš ÒÒØ'*zZô~àýðô”¼¦·íJÖØý}t·´t®¤_á~F‚¯[¼îGàAþpGñu"Ä;¨|‘HáŒ"p SþEލKÇë“cÎ%t²MÖhŠI¾=ßå˧÷•‰>Wzß[çÜÞCÚ¯ÿúμ—to|Ž´±@Ÿ(œ¦³þg¤ye7ðu+CÉU­=éÒxûWD6V¢_C¾M(TÄyÕ=¾Vâuÿºùz=E—d¼3Zú÷~†€mý+]ÞZc²“åF£Däëm+¾Œàhqg–¯P.¤Û´e>¾ø¾#ûb°FŸº±ÐoÌ黑Կ`yÍ~(…‰[`Sá—gíïèfUˆåä p8RAÒŠNTò½å”E«Ê>oõkcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy10subsubsubCACRL.crl000066400000000000000000000007321274666402600325250ustar00rootroot000000000000000‚Ö0¿0  *†H†÷  0\1 0 UUS10U Test Certificates 20111,0*U#requireExplicitPolicy10 subsubsubCA 100101083000Z 301231083000Z /0-0U#0€–Œqü¨;ÎÙÄøÃÐ_iq|èK0 U0  *†H†÷  ‚s–¯¶îX¬Þ8º~6iŸsÍÒ-‹*mŽ%µy”°7¸®®„¯§ ahOþ¤=ÖÌ,ï«÷À+Iêˆ8"YSn*›º© ﱟX ¿.´ˆlŒ€Ðý M­²‚kq"}.~[Î(‚u±‚wAzƒ[ /ž;[ÆòˆÙCè«Yðç½=«ÖׯMkÖ$cÙ¸­÷0¬@R³!µzïØÉë§¢š)aöñ;r+`dæŽ'«8›iµèjgõùp¿‰‰¼áUœÞŽ_<\)t«ÓØ#ª†û“¸«»HÉ¿ñÒ;á\)_¦‘¶C¤[¾ÝU‘Žê÷ˉcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy2CACRL.crl000066400000000000000000000007201274666402600305050ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy2 CA 100101083000Z 301231083000Z /0-0U#0€6©Ùûª8/ ÷L;Ù…š£-©Ç0 U0  *†H†÷  ‚?1NJ‘V…6Çv<úƒ\ˆ~ÂE6ìéI lœƒxÆß&àûá£Õ^SÒx‹æq¢š&O¯á*YnXUüƒ$ùN’Ctv|K´—o BSˆQõÒ‘å…ÿBG% ÝBÒ»ÁšOwLWÐ>Í€-Çàänm ±'ª‚ŸÈg­SǽuãÂêm½$Ø•Y‚yÏ’µ“þç£jãšû¸f¸Y#7Ý<,d™šå_ÓÔ}èU$b9³«LÒ±Ë-- ®c)zE7ƒüç¦6|³èß–šðÃ6ÑZÙ¿€3±… ¾ñøq+aÆ_J\€š‘½Ið¡†wïv¸­pjcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy2subCACRL.crl000066400000000000000000000007231274666402600312220ustar00rootroot000000000000000‚Ï0¸0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy2 subCA 100101083000Z 301231083000Z /0-0U#0€ wþL0â³Q°÷ƒ˜G0 U0  *†H†÷  ‚yäï?GèøßêïæÀ8X mZǵ`Ôô¬ÿu„:ú:ž¹‚ˆ_µ)Ù”N—ŸkÏBØôNDÐtëÍž @¨«¶éMm!ÌÇÏÁæ73 DªyeZW\Z3Hìl¢c£'ª,óZ'‡Ör !›!’Ï/áÙµóé\§rúâ ·‡ut¤|ç†&áq){¨‡¢úmÙ–³½ÆÒô£.tòdV0"YÙ.ëuвŒ$jeËqw×´]Z)¤ÖŸÞ7” 1£YçÛ¨Ø,&¡ÞÇÔ·³§Jùß 5nOï%ÔFÆ?¦ú"#Øù·{/•Š œ.Nb{œÄ𖦙 -§X 7ý1certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy4CACRL.crl000066400000000000000000000007201274666402600305070ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy4 CA 100101083000Z 301231083000Z /0-0U#0€ÍÑÜÌÔ1c,]6±žu¾K^c0 U0  *†H†÷  ‚#TÇR«·€™p×vJïó\:Ô€ºñTwã —DY)XbPšAˆ4~Ξ9LEÏÄÈ¥5âýt€íð›÷zaÓèdåh¬ÂûçÖN;×))ˆ“ÆRÔÄ)IÔÜQ’Oæ®B8AëyB“%Ùß—‰T^÷ˆ|ð³G#Ë>wy.Béu¢´8k‡õ!™Ë)Pœ…”²1¶¶>§üR0æÒkò® ¦e+0ðp¬xè4)ÐIÖ.‡ji²certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy4subCACRL.crl000066400000000000000000000007231274666402600312240ustar00rootroot000000000000000‚Ï0¸0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy4 subCA 100101083000Z 301231083000Z /0-0U#0€}ï”»ö§—æØ"HCH¬³îº0 U0  *†H†÷  ‚² Û*4 Cš jY`u=â¤3¶õšóî‹4äÚs…´¹òWµº5­63vÎ…aYíC'0"¼—£À=/$¤¢oCAH©)ž*N¯î£:›¡VËÞšÌ;™½‹UÞíê+&€›a0g w?uo³€r×6ÈǶˆ«|ÄÍè‰?2©þãÀW›ÅŠAQK›öò_ÁÞv§[o«`ÉÄ1@e#¼­OàqžV||‹óq@µ˜kQr4²WÖœBš fÈÿ]^=eŽT°Du`Åö!UÇåä~öp˜?Í4 ºjŽZŽÏ0^â©ÆÁl&‘9ùwÎ7‚xY£;+œ˜Âe=Ëö‡öÆcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy4subsubCACRL.crl000066400000000000000000000007261274666402600317410ustar00rootroot000000000000000‚Ò0»0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy4 subsubCA 100101083000Z 301231083000Z /0-0U#0€©êæÓž° —¯çþ.2¡gL†0 U0  *†H†÷  ‚=<('Nˆ!“3“ØÈQ>XhuVqˆ |'SQ&+ïÍÆ©kj³×‚E«W—¶ð¾ÂvÂy$O„3L^V_çDá›óüÖüUo0ݨ@þi¼BÜIÂCÊõSÕú9noq5s%™kôE¡¹ˆ¨- uE"j&·'mŠt!Ò4¢‡²S•ÏêúÁÿ(&|P4›Q_–÷¤¢}%¯Nß7¸RŒ–0§ÄŒVk_—G¨&…+ú­ØÎöIÄþ °ÛQsAy¬Î‡ŒÛ±­íê¢{{¾\é#Û1í\ëG‚|îg›nŽ#/ŸQžê¬ ò£§ír¯9å_ÅVL¬švkø¸/0‡cÁØzJ q[fç09+µDÓ ‹$’1öAà å>f¬cËç"”‚&²¼BÀ¥¾?,‹¦}º›Ô‚ýñì´Š)DÂþ×9\*wepѲ¼¼3Ч3n4ôó'þÎIþê×FT$)Šù__ÛMQMcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy5subCACRL.crl000066400000000000000000000007231274666402600312250ustar00rootroot000000000000000‚Ï0¸0  *†H†÷  0U1 0 UUS10U Test Certificates 20111%0#UrequireExplicitPolicy5 subCA 100101083000Z 301231083000Z /0-0U#0€7Ó¿ÞÜPǯȊ蒰ÄHað:0 U0  *†H†÷  ‚Ђ_kTÿ‹,F/_¨¢¸ºÑ´”~Ô°E"Ù)ìèw€–;•ê˜IÏé‹VŠTk‚ƒ»åÃ4¾þ{4šP‚ñ¥épwò€ ËõzÛT{osëø©D€ô+U~ðBfGCÓc^Œƒ(þIƒkõŽ„ßN‹¿± am¦È]ßYV³ XVñš}÷??½‹­ôd ¹®HòR^ CÓ}T}'‡cÇbм7~ù \U¸´ü$ˆÒbTÐnåלð0n\ÅÆvzDÅX%&á_ôå\ùW³Tbëå‹©¬4¼GCac" ªoɵs½˜¬×¹Þp—?+p´ùcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy5subsubCACRL.crl000066400000000000000000000007261274666402600317420ustar00rootroot000000000000000‚Ò0»0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy5 subsubCA 100101083000Z 301231083000Z /0-0U#0€ø‚/yÿ´~Û[¯2ä5aµl0 U0  *†H†÷  ‚©Ò­{–õãç›&°Nˆ·6‰;|*TôÉÃê<¨>Ä;©+H/ ø÷R9+ø‰ý”uÿW® äç;à ®þþBTtþd¤f)’/D9”"c¤¯”nýÎ[bmöˆ‡É· sx|Øw@D¢ø¡øŠ)ß¿O|œ§m:‰ÝƒÆ3ûešJKû–ÞÏw¿¡úä%Ï ê*Ü)Læg‹Ü{qеý®Vò8¼VlÞÎögÔÊløHßà²yeàzI*´M⠲ŠL)gªu ?¶fG¤]ýš5[KldƒZ©Î/™V³ ñýŠV ß>2€Ökê±uaËüo4Q“ÞLp/certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy5subsubsubCACRL.crl000066400000000000000000000007311274666402600324500ustar00rootroot000000000000000‚Õ0¾0  *†H†÷  0[1 0 UUS10U Test Certificates 20111+0)U"requireExplicitPolicy5 subsubsubCA 100101083000Z 301231083000Z /0-0U#0€úbº½~^_ߺ¾y7‚Üü(0 U0  *†H†÷  ‚d"‹K±¹I½¢O4KG MçéJÙ€U• úö;î2{|uD‡ßÊÌëš©èè³¢[d´”dknf(ÃÂO{Õß 9HH¡{ÈMЇ§rxÖÁþ0ÅDÓù­²œÀ’F©zßÇ\ã¢ÌsÌ™dÁ±Èý–+zŒÐ†UŸVÇ?aœC^îd˜¥%aU]¸íÙmãáàEê ôмn±=Wgj‡m‹é¢IÖ#z¢æHíãðÉÐ\¦ß!Æo d)dô´W+§Egï$9Æ»›ë ¨ BŽêφH(MZ;kW'ßsÃ:g«µ1çŸyÿô•…“ígÑ›ááSê ­certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy7CACRL.crl000066400000000000000000000007201274666402600305120ustar00rootroot000000000000000‚Ì0µ0  *†H†÷  0R1 0 UUS10U Test Certificates 20111"0 UrequireExplicitPolicy7 CA 100101083000Z 301231083000Z /0-0U#0€l1—5 ÞÛ5å iXYˆdÌ!ÎJ0 U0  *†H†÷  ‚p¾9ßëç'[A“,Ì „€ŸøÉûáF ’¿³¼²Þ=bigÈAÑ5 g Ï ²ýýÒ´0¶n{ÏZ,t©IµW¼¿fü’ç$`£‰/kº\ ¨ £ÎµÏýîhËÁuq,S¢`œVú¡:ïÔ¸H¢Ö:Ç:ètE±Ô&¼!uý^OlÏ7°Üùº2mpåŠÚ°B-¨ÜúÏ W[A2®8ƒçf³1è½òƨ±'Jø*Hæèt ÖÚÇY8œ]þg ¶¤#a í'gnô{¯®Çê+Y?HeåзЗÆ™Œ§::7ùßúÇ=ÂÁñpi^–certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy7subCARE2CRL.crl000066400000000000000000000007261274666402600315430ustar00rootroot000000000000000‚Ò0»0  *†H†÷  0X1 0 UUS10U Test Certificates 20111(0&UrequireExplicitPolicy7 subCARE2 100101083000Z 301231083000Z /0-0U#0€ç\%Ž~ªLwƒ{ÃêiÖÇ¢4á4Y0 U0  *†H†÷  ‚(io õ‘࿯pŒï@(ô†[§Ê÷NDˆÜê£'1å„iÒèkl(X×(Äã•H„­Z2²W•­úèK÷ ôT0½1L<$Wž!ÊßϬ0aðbq:KœFÿú †íÖÐÃÑš›àè;«i¶t>œÒñÉu »åÿ)„‘£¬kŒ²QG\•å,¸y½¯¬Í·4;ö[ oß·Þd•ž†¥I5Ñl0˜¬Ë:¼ð‹÷q) Ì>(£4æHMYhin mtÆYZÚ¡ 27 LSä'ž‡2Ö¸ŽÝž™T™{˯'ÖÎÊ¢m1¿oœk"5žcertvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy7subsubCARE2RE4CRL.crl000066400000000000000000000007341274666402600325670ustar00rootroot000000000000000‚Ø0Á0  *†H†÷  0^1 0 UUS10U Test Certificates 20111.0,U%requireExplicitPolicy7 subsubCARE2RE4 100101083000Z 301231083000Z /0-0U#0€nÿ‹fþ›¥{ûd3eê•H”˜0 U0  *†H†÷  ‚;‚bãRP£’¬ŒßHhê ÚúÜ l½5gV Rÿ3·dr‡÷Ⱥ±–”Dª\|vQ®³¼»ºí¤r®Ò…. ÊÂé¼eŒìFoÑ9Íy>µÜhûý"mðŽ,˜°ºõâ8Ú«‹HE×i™ˆ‰ÕÃÀð­wâ‡màÌ ¨º±Û=ÎG¸ÇøëŸ)YÙr„7™•uáæöË^Ó¥Gõ5‹ôíë=8ö.Xp"ö—’ªôÊc`Ѥ´ÉÁé`¿¿SÌŽÉJ·s;÷ÝZdIÒ>·¢±h‘ ÿ»]cGøOlAýI{öùAi?öD¨»ƒ’yo¬±±Á´certvalidator-0.11.1/tests/fixtures/nist_pkits/crls/requireExplicitPolicy7subsubsubCARE2RE4CRL.crl000066400000000000000000000007371274666402600333040ustar00rootroot000000000000000‚Û0Ä0  *†H†÷  0a1 0 UUS10U Test Certificates 2011110/U(requireExplicitPolicy7 subsubsubCARE2RE4 100101083000Z 301231083000Z /0-0U#0€{,Qa1­¬,k©¾;;’ªD0 U0  *†H†÷  ‚ ´úgTÊÙÃömØ<Æù×Tšî|©ðkk·•—l¥ûÜ0¡ØëÓ›˜ ƒ­@’8!DÞÕWÇ¥ œê[+XyE+î«» þˆ>'Â!ëûßö±•-”»äÊÔvTl?TÒè,ú«{[já¨8[ºÞÙà|;$´iG b’5®ŸøõŽbýp@Å+lå°†³b] “Âsó•ÌSøþQ]¾bz5#žüm¥QõœD J¨Š&aÍÄü˜éPAd0;¹téB»AŸ°°pëV¦Þ^ò œuIr;›”’äFD–” ä|~&’O6ô‚LÝ*‘E,R:/pøcertvalidator-0.11.1/tests/fixtures/nist_pkits/readme.md000066400000000000000000000001441274666402600234320ustar00rootroot00000000000000Path validation fixtures from http://csrc.nist.gov/groups/ST/crypto_apps_infra/pki/pkitesting.html. certvalidator-0.11.1/tests/fixtures/openssl-ocsp/000077500000000000000000000000001274666402600221125ustar00rootroot00000000000000certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D1.ors000066400000000000000000000037441274666402600231130ustar00rootroot00000000000000MIIFzwoBAKCCBcgwggXEBgkrBgEFBQcwAQEEggW1MIIFsTCBoKIWBBRf2uQDFpGg Ywh4P1y2H9bZ2/BQNBgPMjAxMjEwMjMxMDI1MzZaMHUwczBLMAkGBSsOAwIaBQAE FKByDqBqfGICVPKo9Z3Se6Tzty+kBBSwsEr9HHUo+BxhqhP2+sGQPWsWowISESG8 vx4IzALnkqQG05AvM+2bgAAYDzIwMTIxMDIzMDcwMDAwWqARGA8yMDEyMTAzMDA4 MDAwMFowCwYJKoZIhvcNAQEFA4IBAQAJU3hXN7NApN50/vlZTG2p8+QQJp4uaod3 wyBQ0Ux3DoQZQ9RG6/7Mm4qpOLCCSTh/lJjZ0fD+9eB3gcp/JupN1JrU+dgTyv/Y 9MOctJz7y+VoU9I+qB8knV4sQCwohAVm8GmA9s4p/rHq5Oymci0SuG/QCfkVxOub rI1bWjbHLvvXyvF3PoGMORVHG3SA+jJ9VkHWJyi6brHxY+QR/iYxer8lJsBtpyc7 q2itFgvax/OHwne3lxsck9q0QgKpmEdJu2LuGyWFIhrEwR3b7ASEu1G/nKClv3dR vyOXMm1XIwuUhCjAcpNEKiOMorFwnLS1F8LhfqFWTAFG0JbWpAi8oIID+DCCA/Qw ggPwMIIC2KADAgECAhIRISdENsrz1CSWG3VIBwfQERQwDQYJKoZIhvcNAQEFBQAw WTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExLzAtBgNV BAMTJkdsb2JhbFNpZ24gRXh0ZW5kZWQgVmFsaWRhdGlvbiBDQSAtIEcyMB4XDTEy MDkxOTA3NDA1MFoXDTEyMTIxOTA4NDA1MFowgYUxCzAJBgNVBAYTAkJFMRkwFwYD VQQKExBHbG9iYWxTaWduIG52LXNhMUIwQAYDVQQDEzlHbG9iYWxTaWduIEV4dGVu ZGVkIFZhbGlkYXRpb24gQ0EgLSBHMiBPQ1NQIHJlc3BvbmRlciAtIDIxFzAVBgNV BAUTDjIwMTIwOTE5MDk0MDAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnCgMsBO+IxIqCnXCOfXJoIC3wj+f0s4DV9h2gJBzisWXkaJD2DfNrd0kHUXK qVVPUxnA4G5iZu0Z385/KiOt1/P6vQ/Z2/AsEh/8Z/hIyeZCHL31wrSZW4yLeZwi M76wPiBHJxPun681HQlVs/OGKSHnbHc1XJAIeA/M8u+lLWqIKB+AJ82TrOqUMj1s LjGhQNs84xPliONN5K7DrEy+Y65X/rFxN77Smw+UtcH1GgH2NgaHH8dpt1m25sgm UxZWhdx66opB/lbRQwWdGt7MC0kJFaWHDZq64DTuYoekFYSxAFu0nd0EekEHEJEi 9mquB9cv/96SuEJl8BcUWU/1LwIDAQABo4GEMIGBMAkGA1UdEwQCMAAwDgYDVR0P AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAw HQYDVR0OBBYEFF/a5AMWkaBjCHg/XLYf1tnb8FA0MB8GA1UdIwQYMBaAFLCwSv0c dSj4HGGqE/b6wZA9axajMA0GCSqGSIb3DQEBBQUAA4IBAQCKRl1iXFmOQtLseDWP Y5icDDBGiRi17CGgvIzGJi/ha0PhbO+X0TmQIEnRX3Mu0Er/Mm4RZSjMtJ2iZRh3 tGf4Dn+jKgKOmgXC3oOG/l8RPHLf0yaPSdn/z0TXtA30vTFBLlFeWnhbfhovea4+ snPdBxLqWZdtxmiwojgqA7YATCWwavizrBr09YRyDwzgtpZ2BwMruGuFuV9FsEwL PCM53yFlrM32oFghyfyE5kYjgnnueKM+pw1kA0jgb1CnVJRrMEN1TXuXDAZLtHKG 5X/drah1JtkoZhCzxzZ3bYdVDQJ90OHFqM58lwGD6z3XuPKrHDKZKt+CPIsl5g7p 4J2l certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D1_Cert_EE.pem000066400000000000000000000045321274666402600244130ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIGujCCBaKgAwIBAgISESG8vx4IzALnkqQG05AvM+2bMA0GCSqGSIb3DQEBBQUA MFkxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMS8wLQYD VQQDEyZHbG9iYWxTaWduIEV4dGVuZGVkIFZhbGlkYXRpb24gQ0EgLSBHMjAeFw0x MjA4MTQxMjM1MDJaFw0xMzA4MTUxMDMxMjlaMIIBCjEdMBsGA1UEDwwUUHJpdmF0 ZSBPcmdhbml6YXRpb24xDzANBgNVBAUTBjU3ODYxMTETMBEGCysGAQQBgjc8AgED EwJVUzEeMBwGCysGAQQBgjc8AgECEw1OZXcgSGFtcHNoaXJlMQswCQYDVQQGEwJV UzEWMBQGA1UECAwNTmV3IEhhbXBzaGlyZTETMBEGA1UEBwwKUG9ydHNtb3V0aDEg MB4GA1UECRMXVHdvIEludGVybmF0aW9uYWwgRHJpdmUxDTALBgNVBAsMBC5DT00x GzAZBgNVBAoMEkdNTyBHbG9iYWxTaWduIEluYzEbMBkGA1UEAwwSd3d3Lmdsb2Jh bHNpZ24uY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqx/nHBP4 6s5KKMDlfZS4qFDiAWsoPSRn6WO4nrUF/G2S3I/AdJ0IcSDOHb48/3APj5alqbgo o4IzdG6KLAbENpHMl0L3pHBq/5tJPTi02SbiYUHfp2fhueMauRo8spfEk6fNRnDn QpyMFRkYd7Jz+KMerTO1xAcOH+xp0KkcP0i2jFTEuM3LwR0yTms1rry+RryjDDt5 7W0DLnNFWhyGd6YymzNkCPeL6weV8uk2uYRKKf2XOAzgIpNo3zU6iakZOzlQB9h9 qRuIks2AU/cZ89cBkDjHua0ezX5rG3/Url33jAT9cR5zCXHWtj7VzlOjDXXnn16b L9/AWsvGMNkYHQIDAQABo4ICxzCCAsMwDgYDVR0PAQH/BAQDAgWgMEwGA1UdIARF MEMwQQYJKwYBBAGgMgEBMDQwMgYIKwYBBQUHAgEWJmh0dHBzOi8vd3d3Lmdsb2Jh bHNpZ24uY29tL3JlcG9zaXRvcnkvMIIBKwYDVR0RBIIBIjCCAR6CEnd3dy5nbG9i YWxzaWduLmNvbYIVc3RhdHVzLmdsb2JhbHNpZ24uY29tghF0aC5nbG9iYWxzaWdu LmNvbYISZGV2Lmdsb2JhbHNpZ24uY29tghNpbmZvLmdsb2JhbHNpZ24uY29tghZh cmNoaXZlLmdsb2JhbHNpZ24uY29tghZzdGF0aWMxLmdsb2JhbHNpZ24uY29tghZz dGF0aWMyLmdsb2JhbHNpZ24uY29tghNibG9nLmdsb2JhbHNpZ24uY29tghdzc2xj aGVjay5nbG9iYWxzaWduLmNvbYIVc3lzdGVtLmdsb2JhbHNpZ24uY29tghhvcGVy YXRpb24uZ2xvYmFsc2lnbi5jb22CDmdsb2JhbHNpZ24uY29tMAkGA1UdEwQCMAAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMD8GA1UdHwQ4MDYwNKAyoDCG Lmh0dHA6Ly9jcmwuZ2xvYmFsc2lnbi5jb20vZ3MvZ3NleHRlbmR2YWxnMi5jcmww gYgGCCsGAQUFBwEBBHwwejBBBggrBgEFBQcwAoY1aHR0cDovL3NlY3VyZS5nbG9i YWxzaWduLmNvbS9jYWNlcnQvZ3NleHRlbmR2YWxnMi5jcnQwNQYIKwYBBQUHMAGG KWh0dHA6Ly9vY3NwMi5nbG9iYWxzaWduLmNvbS9nc2V4dGVuZHZhbGcyMB0GA1Ud DgQWBBSvMoTDlFB0aVgVrNkkS1QSmYfx1zAfBgNVHSMEGDAWgBSwsEr9HHUo+Bxh qhP2+sGQPWsWozANBgkqhkiG9w0BAQUFAAOCAQEAgnohm8IRw1ukfc0GmArK3ZLC DLGpsefwWMvNrclqwrgtVrBx4pfe5xGAjqyQ2QI8V8a8a1ytVMCSC1AMWiWxawvW fw48fHunqtpTYNDyEe1Q+7tTGZ0SQ3HljYY9toVEjAMDhiM0Szl6ERRO5S7BTCen mDpWZF8w3ScRRY2UJc8xwWFiYyGWDNzNL1O8R2Y95QIkHUgQpSD3cjl4YvF/Xx/o hBEzl884uNAggIyQRu0ImLEetEtHWB2w0pZG3nTAqjOAAAyH2Q8IHoJtjQzvg6fy IQEO1C5GoQ7isiKIjKBXVYOm+gKSQXlzwj1BlU/OW6kEe24IiERhAN9ILA24wA== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D1_Issuer_ICA.pem000066400000000000000000000031371274666402600250730ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIEhjCCA26gAwIBAgILBAAAAAABL07hXdQwDQYJKoZIhvcNAQEFBQAwTDEgMB4G A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTEwNDEzMTAwMDAwWhcNMjIwNDEz MTAwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1z YTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBFeHRlbmRlZCBWYWxpZGF0aW9uIENBIC0g RzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNoUbMUpq4pbR/WNnN 2EugcgyXW6aIIMO5PUbc0FxSMPb6WU+FX7DbiLSpXysjSKyr9ZJ4FLYyD/tcaoVb AJDgu2X1WvlPZ37HbCnsk8ArysRe2LDb1r4/mwvAj6ldrvcAAqT8umYROHf+IyAl VRDFvYK5TLFoxuJwe4NcE2fBofN8C6iZmtDimyUxyCuNQPZSY7GgrVou9Xk2bTUs Dt0F5NDiB0i3KF4r1VjVbNAMoQFGAVqPxq9kx1UBXeHRxmxQJaAFrQCrDI1la93r wnJUyQ88ABeHIu/buYZ4FlGud9mmKE3zWI2DZ7k0JZscUYBR84OSaqOuR5rW5Isb wO2xAgMBAAGjggFaMIIBVjAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB /wIBADAdBgNVHQ4EFgQUsLBK/Rx1KPgcYaoT9vrBkD1rFqMwRwYDVR0gBEAwPjA8 BgRVHSAAMDQwMgYIKwYBBQUHAgEWJmh0dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29t L3JlcG9zaXRvcnkvMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwuZ2xvYmFs c2lnbi5uZXQvcm9vdC1yMi5jcmwwRAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzAB hihodHRwOi8vb2NzcC5nbG9iYWxzaWduLmNvbS9FeHRlbmRlZFNTTENBMCkGA1Ud JQQiMCAGCCsGAQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNwoDAzAfBgNVHSMEGDAW gBSb4gdXZxwewGoG3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAL0m28rZa pJWrnlrpK4KbzJBrfHRFIOde2Mcj7ig1sTVlKqVR4FU/9oNntOQ2KbDa7JeVqYoF o0X+Iy5SiLQfEICt0oufo1+oxetz3nmIQZgz7qdgGLFGyUAQB5yPClLJExoGbqCb LTr2rk/no1E1KlsYBRLlUdy2NmLz4aQP++TPw5S/EauhWTEB8MxT7I9j12yW00gq iiPtRVaoZkHqAblH7qFHDBTxI+Egc8p9UHxkOFejj0qcm+ltRc9Ea01gIEBxJbVG qmwIft/I+shWKpLLg7h5CZctXqEBzgbttJfJBNxB7+BPNk3kQHNG7BESfIhbNCYl TercGL7FG81kwA== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D2.ors000066400000000000000000000037741274666402600231170ustar00rootroot00000000000000MIIF4AoBAKCCBdkwggXVBgkrBgEFBQcwAQEEggXGMIIFwjCBmaIWBBTqlwecTarB yVdbHxANRLCFYj1mqBgPMjAxMjEwMjMxMDI1MzZaMG4wbDBEMAkGBSsOAwIaBQAE FLdXtbacB/gWIxOOkMkqDr4yAaoxBBRge2YaRQ2XyolQL30EzTSo//z9SwILBAAA AAABL07hRxCAABgPMjAxMjEwMDEwNjAwMDBaoBEYDzIwMTMwNDE1MDYwMDAwWjAL BgkqhkiG9w0BAQUDggEBAEJN4FuPQPnizPIwEj4Q8Ht765gI6QqMNrvj3UykxYeu qUajKcqA+V1zaDHTaz+eCQthtmCNKC9T+zVkjGelVsd7Kn2fVKWqp+5wVPI8dVkm 6Gs/IGZ16HDnQ/siTrY3ILWCRz4Hf6lnHpIErQuQRQyjlGKNcE7RYmjGw4w0bxx8 vHN/baCMApBL0D0zeBqlpJCMUZqJJ3D1+87HxHYR1MkMZDC9rOPIhlpEP4yL17gx ckrPf+w+A/3kC++jVeA3b8Xtr+MaWOFH4xVn6BTxopczZKVl18tSYqgwITlx5/cL LpYEdllC0l83E8GRzsOp0SvFxo0NBotgFNZQQujpOzagggQQMIIEDDCCBAgwggLw oAMCAQICCwQAAAAAAThXovYBMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRsw GQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwHhcNMTIwNzA1MTgwMDAwWhcNMTMw NzA1MTgwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu di1zYTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBPQ1NQIGZvciBSb290IFIxIC0gQnJh bmNoIDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDP2QF8p0+Fb7ID MwwD1gEr2oazjqbW28EZr3YEyMPk+7VFaGePSO1xjBGIE48Q7m7d6p6ZXCzlBZEi oudrHSr3WDqdIVKLDrZIDkgEgdjJE72Hq6Pf5CEGXyebbODm4sV96EfewSvOOYLL 866g3aoVhLDK02ny+Q5OsokW7nhnmGMMh10tZqR5VmdQTiw8MgeqUxBEaEO4WH2J ltgSsgNJBNBYuDgnn5ryzVqhvmCJvYZMYeN6qZFKy1MgHcR+wEpGLPlRL4ttu6e5 MJrVta7dVFobHUHoFog97LtQT1PY0Ubaihswjge5O04bYeCrgSSjr1e4xH/KDxRw yyhoscaFAgMBAAGjgdIwgc8wDgYDVR0PAQH/BAQDAgeAMB0GA1UdDgQWBBTqlwec TarByVdbHxANRLCFYj1mqDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBXzA0MDIGCCsG AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMB8GA1UdIwQYMBaAFGB7ZhpF DZfKiVAvfQTNNKj//P1LMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQAD ggEBAHiC6N1uF29d7CmiVapA8Nr1xLSVeIkBd4A8yHsUTQ7ATI7bwT14QUV4awe7 8cvmO5ZND8YG1ViwN162WFm9ivSoWBzvWDbU2JhQFb+XzrzCcdn0YbNiTxJh/vYm uDuxto00dpBgujSOAQv8B90iDEJ+sZpYRzDRj62qStRey0zpq5eX+pA+gdppMUFb 4QvJf0El8TbLCWLN4TjrFe6ju7ZaN9zmgVYGQ2fMHKIGNScLuIA950nYwzRkIfHa YW6HqP1rCR1EiYmstEeCQyDxJx+RUlh+q8L1BKzaMYhS6s63MZzQuGseYStaCmbC fBIRKjnK621vAWvc7UR+0hqnZ+U= certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D2_Cert_ICA.pem000066400000000000000000000031121274666402600245100ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIEdzCCA1+gAwIBAgILBAAAAAABL07hRxAwDQYJKoZIhvcNAQEFBQAwVzELMAkG A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw0wNjEyMTUwODAw MDBaFw0yODAxMjgxMjAwMDBaMEwxIDAeBgNVBAsTF0dsb2JhbFNpZ24gUm9vdCBD QSAtIFIyMRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAps8kDr4ubyiZRULEqz4h VJsL03+EcPoSs8u/h1/Gf4bTsjBc1v2t8Xvc5fhglgmSEPXQU977e35ziKxSiHtK pspJpl6op4xaEbx6guu+jOmzrJYlB5dKmSoHL7Qed7+KD7UCfBuWuMW5Oiy81hK5 61l94tAGhl9eSWq1OV6INOy8eAwImIRsqM1LtKB9DHlN8LgtyyHK1WxbfeGgKYSh +dOUScskYpEgvN0L1dnM+eonCitzkcadG6zIy+jgoPQvkItN+7A2G/YZeoXgbfJh E4hcn+CTClGXilrOr6vV96oJqmC93Nlf33KpYBNeAAHJSvo/pOoHAyECjoLKA8Kb jwIDAQABo4IBTTCCAUkwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8w HQYDVR0OBBYEFJviB1dnHB7AagbeWbSaLd/cGYYuMEcGA1UdIARAMD4wPAYEVR0g ADA0MDIGCCsGAQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBv c2l0b3J5LzAzBgNVHR8ELDAqMCigJqAkhiJodHRwOi8vY3JsLmdsb2JhbHNpZ24u bmV0L3Jvb3QuY3JsMD0GCCsGAQUFBwEBBDEwLzAtBggrBgEFBQcwAYYhaHR0cDov L29jc3AuZ2xvYmFsc2lnbi5jb20vcm9vdHIxMCkGA1UdJQQiMCAGCCsGAQUFBwMB BggrBgEFBQcDAgYKKwYBBAGCNwoDAzAfBgNVHSMEGDAWgBRge2YaRQ2XyolQL30E zTSo//z9SzANBgkqhkiG9w0BAQUFAAOCAQEAOg/NJk04MAioxvxc2Ah67/ocKgPO Mq5EluFSA5UKUtZnr1uWfN0ZizBbNjprbqAVxoKhyzlmAFeLAqJuhfusVVq4FVAa kN4JSOyo9lccGDG9xn3IvevCpzlRbaL/HHjeHCcE4c8klegO5NUfsPn7UMrLbp5i JniG9cT1eI/dcq9uLtWe3c48y7jHLVRg1+WcAkuGRPBXUSvNCps8sfU6TB2KxfAw PmWHxA5fbkqsiqge5/rkM4AVhFZlJZv7njCIy5EWwQXDqSTsIdLVsPy3I0annff3 xlMSeDe0E3OPN5deBJv5mYuTPiZCl5/9HrXVy4hINKJmoPqsco/dRy+CdA== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D2_Issuer_Root.pem000066400000000000000000000023551274666402600254240ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp 1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE 38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D3.ors000066400000000000000000000045561274666402600231170ustar00rootroot00000000000000MIIG8AoBAKCCBukwggblBgkrBgEFBQcwAQEEggbWMIIG0jCB+aF+MHwxCzAJBgNV BAYTAkFVMQwwCgYDVQQIEwNOU1cxDzANBgNVBAcTBlN5ZG5leTEUMBIGA1UEChML Q0FjZXJ0IEluYy4xHjAcBgNVBAsTFVNlcnZlciBBZG1pbmlzdHJhdGlvbjEYMBYG A1UEAxMPb2NzcC5jYWNlcnQub3JnGA8yMDEyMTAyMzEwMzkzMFowZjBkMDwwCQYF Kw4DAhoFAAQUi6TJyxcpGUU+u45zCZG5JfKDImUEFBa1MhvUx/Pg5o7zvdKwOu6y ORjRAgMLs8aAABgPMjAxMjEwMjMwOTU5MTJaoBEYDzIwMTIxMDI1MTAzOTMwWjAN BgkqhkiG9w0BAQUFAAOCAQEAYaaAzW26JQGFRyawj9ROtnSdJ9QPJ6B/wfpJif8e QU9lmKx0zIDdTum3Mc5tfxML71W025UW9jzowAfQ5bZbqa4nwZlWX5Py3hKebeYo WiND4pvhS4BRkheSkycEok0bj1FJYWYiJVpnTqKAPnOKrlL4qvGC2IOHk2toS/Je iLyoUwxrPtqaXt4Caoa3I70HE3H1QqvPIGIY6V4bxV7Km/xv99QOutkbfANGiNsx W7EDB3TRNhldzMnjEwG58X5Pe3xwEVqjCiBL+wQ8JALn08bJzFn9E04aYrqCGc8s gw1dgaBoZt+0vbQUN71KEocwMj5mzJqottOyqNwo7FZnBaCCBL4wggS6MIIEtjCC Ap6gAwIBAgIDCpvzMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0Ex HjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2Vy dCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNl cnQub3JnMB4XDTExMDgyMzAwMDI1NloXDTEzMDgyMjAwMDI1NlowfDELMAkGA1UE BhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYDVQQKEwtD QWNlcnQgSW5jLjEeMBwGA1UECxMVU2VydmVyIEFkbWluaXN0cmF0aW9uMRgwFgYD VQQDEw9vY3NwLmNhY2VydC5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCcxtRv5CPHw3BLdR/k/K72YsRgodbP+UdAONmvBvWzhwm6B8h6O+M64sFr 2w6be7SYBECIyOQgNJ1flK4MoAWhdBA/H5NtxaDOKbAqA27tO9GaevcPp7c518O0 3hVnlPLvsN1f48nY0jQOXUTfv5nYXmD0OSSK/V3IRo0KsWB6T9UnMGCeEwb4Oqqz uzM0b4SBflzMEony/m6Tg/qL7qs2TLZAqe77+BZaVdFkDUnaBN7RyMruXySxeXiz mogT3WhROeloMa/X+E01bWBYBEK7VZIY9pgBpXQ7vDbbIGgYuIXUi20wh03WMy16 VDYdV0IUXHpidNUeK9W/BPP/7APBAgMBAAGjRDBCMAwGA1UdEwEB/wQCMAAwJwYD VR0lBCAwHgYIKwYBBQUHAwIGCCsGAQUFBwMBBggrBgEFBQcDCTAJBgNVHREEAjAA MA0GCSqGSIb3DQEBBQUAA4ICAQAoT6p5f3cGprAcgrnzdenfTmDe9LCW7k2VnazA MAzpsD6gXcSlo4+3hoHem/SpKRH2tqi34DmImCiv/S6fxsKM4Gfn5rlkAFviuTvS r5Zrwh4ZKSfaoWv4bmbzmcAxvuxdMWHf/5PbjegjzFTbBMekVPZY/abYtD6kdHQZ VNgzwZVfTBfYhfa+Rg72I2zjKpMsjxMqWfTmUzW6wfK6LFudZqu0U1NnJw+IlnVU 6WtjL885ebQrmcRqWz3nMhVLIu5L3w/s+VTLvm7If6jcMDNUjz8s2BPcJeCXg3TE STsyl6tvk17RRz2+9JskxVOk11xIn96xR4FCERIid2ek9z1xi7oYOajQF50i/9Gj ReDEfRSyb4/LzoKDOY+h4Q6jryeHh7WIHFiK5qrBN2y8qOoRJ/OqQnqci/BJBNpe g9Q9PJRgGSzRndTXNHiYRbeLpq7eGo3sPqlR9qBQ3rd98XGOU0RCMnzjKhENC3qo 5PkSF2xs8RmjWktFSTDwjYo0qf1teo7CGHjgaPjQ7JE8Q4ysFOQndSWmLpqwDcI9 HfIvPwUIWArQrJRh9LCNSyvHVgLqY9kw8NW4TlMxV2WqaYCkiKi3XVRrSFR3ahS1 VBvRZ8KpplrV7rhXjVSSqqfLk1sX3l72Ck2F9ON+qbNFmvhgNjSiBY9neMgo804a wG/pag== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D3_Cert_EE.pem000066400000000000000000000052341274666402600244150ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIFZDCCA0ygAwIBAgIDC7PGMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jv b3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZ Q0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9y dEBjYWNlcnQub3JnMB4XDTEyMDUwNjE4NDY0MVoXDTE0MDUwNjE4NDY0MVowWzEL MAkGA1UEBhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYD VQQKEwtDQWNlcnQgSW5jLjEXMBUGA1UEAxMOd3d3LmNhY2VydC5vcmcwggEiMA0G CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDeNSAxSFtymeN6rQD69eXIJEnCCP7Z 24/fdOgxRDSBhfQDUVhdmsuDOvuziOoWGqRxZPcWdMEMRcJ5SrA2aHIstvnaLhUl xp2fuaeXx9XMCJ9ZmzHZbH4wqLaU+UlhcSsdkPzapf3N3HaUAW8kT4bHEGzObYVC UBxxhpY01EoGRQmnFojzLNF3+0O1npQzXg5MeIWHW/Z+9jE+6odL6IXgg1bvrP4d FgoveTcG6BmJu+50RwHaUad7hQuNeS+pNsVzCiDdMF2qoCQXtAGhnEQ9/KHpBD2z ISBVIyEbYxdyU/WxnkaOof63Mf/TAgMNzVN9duqEtFyvvMrQY1XkBBwfAgMBAAGj ggERMIIBDTAMBgNVHRMBAf8EAjAAMDQGA1UdJQQtMCsGCCsGAQUFBwMCBggrBgEF BQcDAQYJYIZIAYb4QgQBBgorBgEEAYI3CgMDMAsGA1UdDwQEAwIFoDAzBggrBgEF BQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmNhY2VydC5vcmcvMIGE BgNVHREEfTB7gg53d3cuY2FjZXJ0Lm9yZ4IRc2VjdXJlLmNhY2VydC5vcmeCEnd3 d21haWwuY2FjZXJ0Lm9yZ4IKY2FjZXJ0Lm9yZ4IOd3d3LmNhY2VydC5uZXSCCmNh Y2VydC5uZXSCDnd3dy5jYWNlcnQuY29tggpjYWNlcnQuY29tMA0GCSqGSIb3DQEB BQUAA4ICAQA2+uCGX18kZD8gyfj44TlwV4TXJ5BrT0M9qogg2k5u057i+X2ePy3D iE2REyLkU+i5ekH5gvTl74uSJKtpSf/hMyJEByyPyIULhlXCl46z2Z60drYzO4ig apCdkm0JthVGvk6/hjdaxgBGhUvSTEP5nLNkDa+uYVHJI58wfX2oh9gqxf8VnMJ8 /A8Zi6mYCWUlFUobNd/ozyDZ6WVntrLib85sAFhds93nkoUYxgx1N9Xg/I31/jcL 6bqmpRAZcbPtvEom0RyqPLM+AOgySWiYbg1Nl8nKx25C2AuXk63NN4CVwkXpdFF3 q5qk1izPruvJ68jNW0pG7nrMQsiY2BCesfGyEzY8vfrMjeR5MLNv5r+obeYFnC1j uYp6JBt+thW+xPFzHYLjohKPwo/NbMOjIUM9gv/Pq3rVRPgWru4/8yYWhrmEK370 rtlYBUSGRUdR8xed1Jvs+4qJ3s9t41mLSXvUfwyPsT7eoloUAfw3RhdwOzXoC2P6 ftmniyu/b/HuYH1AWK+HFtFi9CHiMIqOJMhj/LnzL9udrQOpir7bVej/mlb3kSRo 2lZymKOvuMymMpJkvBvUU/QEbCxWZAkTyqL2qlcQhHv7W366DOFjxDqpthaTRD69 T8i/2AnsBDjYFxa47DisIvR57rLmE+fILjSvd94N/IpGs3lSOS5JeA== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/D3_Issuer_Root.pem000066400000000000000000000120731274666402600254230ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIHPTCCBSWgAwIBAgIBADANBgkqhkiG9w0BAQQFADB5MRAwDgYDVQQKEwdSb290 IENBMR4wHAYDVQQLExVodHRwOi8vd3d3LmNhY2VydC5vcmcxIjAgBgNVBAMTGUNB IENlcnQgU2lnbmluZyBBdXRob3JpdHkxITAfBgkqhkiG9w0BCQEWEnN1cHBvcnRA Y2FjZXJ0Lm9yZzAeFw0wMzAzMzAxMjI5NDlaFw0zMzAzMjkxMjI5NDlaMHkxEDAO BgNVBAoTB1Jvb3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEi MCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJ ARYSc3VwcG9ydEBjYWNlcnQub3JnMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAziLA4kZ97DYoB1CW8qAzQIxL8TtmPzHlawI229Z89vGIj053NgVBlfkJ 8BLPRoZzYLdufujAWGSuzbCtRRcMY/pnCujW0r8+55jE8Ez64AO7NV1sId6eINm6 zWYyN3L69wj1x81YyY7nDl7qPv4coRQKFWyGhFtkZip6qUtTefWIonvuLwphK42y fk1WpRPs6tqSnqxEQR5YYGUFZvjARL3LlPdCfgv3ZWiYUQXw8wWRBB0bF4LsyFe7 w2t6iPGwcswlWyCR7BYCEo8y6RcYSNDHBS4CMEK4JZwFaz+qOqfrU0j36NK2B5jc G8Y0f3/JHIJ6BVgrCFvzOKKrF11myZjXnhCLotLddJr3cQxyYN/Nb5gznZY0dj4k epKwDpUeb+agRThHqtdB7Uq3EvbXG4OKDy7YCbZZ16oE/9KTfWgu3YtLq1i6L43q laegw1SJpfvbi1EinbLDvhG+LJGGi5Z4rSDTii8aP8bQUWWHIbEZAWV/RRyH9XzQ QUxPKZgh/TMfdQwEUfoZd9vUFBzugcMd9Zi3aQaRIt0AUMyBMawSB3s42mhb5ivU fslfrejrckzzAeVLIL+aplfKkQABi6F1ITe1Yw1nPkZPcCBnzsXWWdsC4PDSy826 YreQQejdIOQpvGQpQsgi3Hia/0PsmBsJUUtaWsJx8cTLc6nloQsCAwEAAaOCAc4w ggHKMB0GA1UdDgQWBBQWtTIb1Mfz4OaO873SsDrusjkY0TCBowYDVR0jBIGbMIGY gBQWtTIb1Mfz4OaO873SsDrusjkY0aF9pHsweTEQMA4GA1UEChMHUm9vdCBDQTEe MBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0 IFNpZ25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2Vy dC5vcmeCAQAwDwYDVR0TAQH/BAUwAwEB/zAyBgNVHR8EKzApMCegJaAjhiFodHRw czovL3d3dy5jYWNlcnQub3JnL3Jldm9rZS5jcmwwMAYJYIZIAYb4QgEEBCMWIWh0 dHBzOi8vd3d3LmNhY2VydC5vcmcvcmV2b2tlLmNybDA0BglghkgBhvhCAQgEJxYl aHR0cDovL3d3dy5jYWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDBWBglghkgBhvhC AQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQg b3ZlciB0byBodHRwOi8vd3d3LmNhY2VydC5vcmcwDQYJKoZIhvcNAQEEBQADggIB ACjH7pyCArpcgBLKNQodgW+JapnM8mgPf6fhjViVPr3yBsOQWqy1YPaZQwGjiHCc nWKdpIevZ1gNMDY75q1I08t0AoZxPuIrA2jxNGJARjtT6ij0rPtmlVOKTV39O9lg 18p5aTuxZZKmxoGCXJzN600BiqXfEVWqFcofN8CCmHBh22p8lqOOLlQ+TyGpkO/c gr/c6EWtTZBzCDyUZbAEmXZ/4rzCahWqlwQ3JNgelE5tDlG+1sSPypZt90Pf6DBl Jzt7u0NDY8RD97LsaMzhGY4i+5jhe1o+ATc7iwiwovOVThrLm82asduycPAtStvY sONvRUgzEv/+PDIqVPfE94rwiCPCR/5kenHA0R6mY7AHfqQv0wGP3J8rtsYIqQ+T SCX8Ev2fQtzzxD72V7DX3WnRBnc0CkvSyqD/HMaMyRa+xMwyN2hzXwj7UfdJUzYF CpUCTPJ5GhD22Dp1nPMd8aINcGeGG7MW9S/lpOt5hvk9C8JzC6WZrG/8Z7jlLwum GCSNe9FINSkYQKyTYOGWhlC0elnYjyELn8+CkcY7v2vcB5G5l1YjqrZslMZIBjzk zk6q5PYvCdxTby78dOs6Y5nCpqyJvKeyRKANihDjbPIky/qbn3BHLt4Ui9SyIAmW omTxJBzcoTWcFbLUvFUufQb1nA5V9FrWk9p2rSVzTMVD -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIHWTCCBUGgAwIBAgIDCkGKMA0GCSqGSIb3DQEBCwUAMHkxEDAOBgNVBAoTB1Jv b3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZ Q0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9y dEBjYWNlcnQub3JnMB4XDTExMDUyMzE3NDgwMloXDTIxMDUyMDE3NDgwMlowVDEU MBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cuQ0FjZXJ0 Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDCCAiIwDQYJKoZIhvcN AQEBBQADggIPADCCAgoCggIBAKtJNRFIfNImflOUz0Op3SjXQiqL84d4GVh8D57a iX3h++tykA10oZZkq5+gJJlz2uJVdscXe/UErEa4w75/ZI0QbCTzYZzA8pD6Ueb1 aQFjww9W4kpCz+JEjCUoqMV5CX1GuYrz6fM0KQhF5Byfy5QEHIGoFLOYZcRD7E6C jQnRvapbjZLQ7N6QxX8KwuPr5jFaXnQ+lzNZ6MMDPWAzv/fRb0fEze5ig1JuLgia pNkVGJGmhZJHsK5I6223IeyFGmhyNav/8BBdwPSUp2rVO5J+TJAFfpPBLIukjmJ0 FXFuC3ED6q8VOJrU0gVyb4z5K+taciX5OUbjchs+BMNkJyIQKopPWKcDrb60LhPt XapI19V91Cp7XPpGBFDkzA5CW4zt2/LP/JaT4NsRNlRiNDiPDGCbO5dWOK3z0luL oFvqTpa4fNfVoIZwQNORKbeiPK31jLvPGpKK5DR7wNhsX+kKwsOnIJpa3yxdUly6 R9Wb7yQocDggL9V/KcCyQQNokszgnMyXS0XvOhAKq3A6mJVwrTWx6oUrpByAITGp rmB6gCZIALgBwJNjVSKRPFbnr9s6JfOPMVTqJouBWfmh0VMRxXudA/Z0EeBtsSw/ LIaRmXGapneLNGDRFLQsrJ2vjBDTn8Rq+G8T/HNZ92ZCdB6K4/jc0m+YnMtHmJVA BfvpAgMBAAGjggINMIICCTAdBgNVHQ4EFgQUdahxYEyIE/B42Yl3tW3Fid+8sXow gaMGA1UdIwSBmzCBmIAUFrUyG9TH8+DmjvO90rA67rI5GNGhfaR7MHkxEDAOBgNV BAoTB1Jvb3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAG A1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYS c3VwcG9ydEBjYWNlcnQub3JnggEAMA8GA1UdEwEB/wQFMAMBAf8wXQYIKwYBBQUH AQEEUTBPMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5DQWNlcnQub3JnLzAoBggr BgEFBQcwAoYcaHR0cDovL3d3dy5DQWNlcnQub3JnL2NhLmNydDBKBgNVHSAEQzBB MD8GCCsGAQQBgZBKMDMwMQYIKwYBBQUHAgEWJWh0dHA6Ly93d3cuQ0FjZXJ0Lm9y Zy9pbmRleC5waHA/aWQ9MTAwNAYJYIZIAYb4QgEIBCcWJWh0dHA6Ly93d3cuQ0Fj ZXJ0Lm9yZy9pbmRleC5waHA/aWQ9MTAwUAYJYIZIAYb4QgENBEMWQVRvIGdldCB5 b3VyIG93biBjZXJ0aWZpY2F0ZSBmb3IgRlJFRSwgZ28gdG8gaHR0cDovL3d3dy5D QWNlcnQub3JnMA0GCSqGSIb3DQEBCwUAA4ICAQApKIWuRKm5r6R5E/CooyuXYPNc 7uMvwfbiZqARrjY3OnYVBFPqQvX56sAV2KaC2eRhrnILKVyQQ+hBsuF32wITRHhH Va9Y/MyY9kW50SD42CEH/m2qc9SzxgfpCYXMO/K2viwcJdVxjDm1Luq+GIG6sJO4 D+Pm1yaMMVpyA4RS5qb1MyJFCsgLDYq4Nm+QCaGrvdfVTi5xotSu+qdUK+s1jVq3 VIgv7nSf7UgWyg1I0JTTrKSi9iTfkuO960NAkW4cGI5WtIIS86mTn9S8nK2cde5a lxuV53QtHA+wLJef+6kzOXrnAzqSjiL2jA3k2X4Ndhj3AfnvlpaiVXPAPHG0HRpW Q7fDCo1y/OIQCQtBzoyUoPkD/XFzS4pXM+WOdH4VAQDmzEoc53+VGS3FpQyLu7Xt hbNc09+4ufLKxw0BFKxwWMWMjTPUnWajGlCVI/xI4AZDEtnNp4Y5LzZyo4AQ5OHz 0ctbGsDkgJp8E3MGT9ujayQKurMcvEp4u+XjdTilSKeiHq921F73OIZWWonO1sOn ebJSoMbxhbQljPI/lrMQ2Y1sVzufb4Y6GIIiNsiwkTjbKqGTqoQ/9SdlrnPVyNXT d+pLncdBu8fA46A/5H2kjXPmEkvfoXNzczqA6NXLji/L6hOn1kGLrPo8idck9U60 4GGSt/M3mMS+lqO3ig== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISDOSC_D1.ors000066400000000000000000000037441274666402600241570ustar00rootroot00000000000000MIIFzwoBAKCCBcgwggXEBgkrBgEFBQcwAQEEggW1MIIFsTCBoKIWBBSpTXftIZX0 lLT9zwVSQC5Jfp3pqhgPMjAxMjEwMTAxNDU0NDNaMHUwczBLMAkGBSsOAwIaBQAE FKByDqBqfGICVPKo9Z3Se6Tzty+kBBSwsEr9HHUo+BxhqhP2+sGQPWsWowISESG8 vx4IzALnkqQG05AvM+2bgAAYDzIwMTIxMDEwMTMwMDAwWqARGA8yMDEyMTAxNzEz MDAwMFowCwYJKoZIhvcNAQEFA4IBAQBw5Z+0ggEddRTIq7cXlMoxG9Nrx4HtutsH itIUoZp/rlLoxHsJTo/VmdZvTTGIc7Ok9XuoH61lY/x9glAKsGRjz4Myc9+5rx0O 675lwmOS+uaf3/hRkicVrVr7Pt2ug3R7OXm2MJrohjNKP8lqtLJ0hHP88a8rotKA r9uz/qHm7K4Uh7dRt/Pnu9MPG74tZeFNN4M1ONMEiRdG39FqzFDXWxwQ3NmyC0Wo DQn+NklZMknr8mm7IBWpzgU1fTD9R0yv0zdhUZGiEXxvdhm7GJrTET5jS30Ksm5j o+n39YVu/vGbjyyYx3+WdeQLEyipaGvldSuJpT+R684/RuFWNetcoIID+DCCA/Qw ggPwMIIC2KADAgECAhIRIcYjwu4UNkR1VGrDbSdFei8wDQYJKoZIhvcNAQEFBQAw WTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExLzAtBgNV BAMTJkdsb2JhbFNpZ24gRXh0ZW5kZWQgVmFsaWRhdGlvbiBDQSAtIEcyMB4XDTEy MDkxOTA3NDAzMVoXDTEyMTIxOTA4NDAzMVowgYUxCzAJBgNVBAYTAkJFMRkwFwYD VQQKExBHbG9iYWxTaWduIG52LXNhMUIwQAYDVQQDEzlHbG9iYWxTaWduIEV4dGVu ZGVkIFZhbGlkYXRpb24gQ0EgLSBHMiBPQ1NQIHJlc3BvbmRlciAtIDExFzAVBgNV BAUTDjIwMTIwOTE5MDkzOTAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAxkkb6QhDH3sEDj4zaysjVzYelq9lZ1cso4R2IyQxaoPaG6GkaCmHA4sz6KP+ m3ADqplibEUBa/mzCxHW8/oy3NhGMFdbezduZrnRFLbzakOTeIo8VEIM3JPfgREv CX8nj6Xu7ERD6JO/ZQ9Xr7YVzKKN+3cVZlcMHoGBnOPcO2Sz0AcYyk5m5IsGBRoT T86j6Cr9PhOPTVwXL6Wxy1KVHsUZXUwnRacV0O4SHWQ4zM9Sablus9fTbh1CgIqW sKDyzVB4yECXkBVeUlA+cuCaRRVHRiR+jPDSgbU62nnNudEpGG7dyoop6IOvXv2O ydncWzaukxIVvQ/Ij85kHqs7HQIDAQABo4GEMIGBMAkGA1UdEwQCMAAwDgYDVR0P AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAw HQYDVR0OBBYEFKlNd+0hlfSUtP3PBVJALkl+nemqMB8GA1UdIwQYMBaAFLCwSv0c dSj4HGGqE/b6wZA9axajMA0GCSqGSIb3DQEBBQUAA4IBAQCe4rZg61Dmwygl/Uae BJZog64/FvuB1sfCqKLJTjKOfLcugSTX1TT7bLJbzXRGPQuorI3TIZEOwldIw01d DTLlsOCHrfHd+bpxgijxPkUuaA4NYnpvqTEMJqPKOC8QYfKupNjAPSuHvwqvqCfO RCe3jY6xQDO0WCTZ8/xMsOkw+J/YEYqALETf2Ug7k5eRL/TvfLd8Sgi7vPfmUeiW ptlsbhMOWQoQc+JA3vCI01rrjNq+0kIZ/r8nPGvablRr0Aakk6eDuS2dcReaPwuK 0xE136pJYiXdQ3SA7uwmlorjxmejavyoPCr23TU74DQEt6hhc6uIcabsa4Y8KvJy RI4F certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISDOSC_D2.ors000066400000000000000000000037741274666402600241630ustar00rootroot00000000000000MIIF4AoBAKCCBdkwggXVBgkrBgEFBQcwAQEEggXGMIIFwjCBmaIWBBTqlwecTarB yVdbHxANRLCFYj1mqBgPMjAxMjEwMTEwOTE1MzNaMG4wbDBEMAkGBSsOAwIaBQAE FLdXtbacB/gWIxOOkMkqDr4yAaoxBBRge2YaRQ2XyolQL30EzTSo//z9SwILBAAA AAABL07hRxCAABgPMjAxMjEwMDEwNjAwMDBaoBEYDzIwMTMwNDE1MDYwMDAwWjAL BgkqhkiG9w0BAQUDggEBAF/9ByrCS+pCCK4qovqUAH/yoWckmpLFCzKJGHkErJeY FlUbAJuu/Gs0IdLmLp+2VbStjsL4vLtDU2Q4e417C1fm8+ixh+kP7qPRd8cxyMBx cmD2m1v0CgbrflCZEC71cTrrWpcW+6jg623lI4Ug3A4zlizbT/f9IrxuV9VB9/G5 6kPI5dYOVZM0ColIxmJsafuxfr6ONQLPHKTlZJK3SyWebs25006OmrSyfBi0j26j WU5d6B2NJZBKqvDVMXxZ0q6QOgKxOs8WD+6DaA1d1f7gTOl45XJZWz5KnRePyRxM Fp0ak6XYbE1y2vHE2RWp1w4lcVJ0BUQXWxx+g86F5W2gggQQMIIEDDCCBAgwggLw oAMCAQICCwQAAAAAAThXovYBMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRsw GQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwHhcNMTIwNzA1MTgwMDAwWhcNMTMw NzA1MTgwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu di1zYTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBPQ1NQIGZvciBSb290IFIxIC0gQnJh bmNoIDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDP2QF8p0+Fb7ID MwwD1gEr2oazjqbW28EZr3YEyMPk+7VFaGePSO1xjBGIE48Q7m7d6p6ZXCzlBZEi oudrHSr3WDqdIVKLDrZIDkgEgdjJE72Hq6Pf5CEGXyebbODm4sV96EfewSvOOYLL 866g3aoVhLDK02ny+Q5OsokW7nhnmGMMh10tZqR5VmdQTiw8MgeqUxBEaEO4WH2J ltgSsgNJBNBYuDgnn5ryzVqhvmCJvYZMYeN6qZFKy1MgHcR+wEpGLPlRL4ttu6e5 MJrVta7dVFobHUHoFog97LtQT1PY0Ubaihswjge5O04bYeCrgSSjr1e4xH/KDxRw yyhoscaFAgMBAAGjgdIwgc8wDgYDVR0PAQH/BAQDAgeAMB0GA1UdDgQWBBTqlwec TarByVdbHxANRLCFYj1mqDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBXzA0MDIGCCsG AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMB8GA1UdIwQYMBaAFGB7ZhpF DZfKiVAvfQTNNKj//P1LMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQAD ggEBAHiC6N1uF29d7CmiVapA8Nr1xLSVeIkBd4A8yHsUTQ7ATI7bwT14QUV4awe7 8cvmO5ZND8YG1ViwN162WFm9ivSoWBzvWDbU2JhQFb+XzrzCcdn0YbNiTxJh/vYm uDuxto00dpBgujSOAQv8B90iDEJ+sZpYRzDRj62qStRey0zpq5eX+pA+gdppMUFb 4QvJf0El8TbLCWLN4TjrFe6ju7ZaN9zmgVYGQ2fMHKIGNScLuIA950nYwzRkIfHa YW6HqP1rCR1EiYmstEeCQyDxJx+RUlh+q8L1BKzaMYhS6s63MZzQuGseYStaCmbC fBIRKjnK621vAWvc7UR+0hqnZ+Y= certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISDOSC_D3.ors000066400000000000000000000045561274666402600241630ustar00rootroot00000000000000MIIG8AoBAKCCBukwggblBgkrBgEFBQcwAQEEggbWMIIG0jCB+aF+MHwxCzAJBgNV BAYTAkFVMQwwCgYDVQQIEwNOU1cxDzANBgNVBAcTBlN5ZG5leTEUMBIGA1UEChML Q0FjZXJ0IEluYy4xHjAcBgNVBAsTFVNlcnZlciBBZG1pbmlzdHJhdGlvbjEYMBYG A1UEAxMPb2NzcC5jYWNlcnQub3JnGA8yMDEyMTAxMTEwMTAyMVowZjBkMDwwCQYF Kw4DAhoFAAQUi6TJyxcpGUU+u45zCZG5JfKDImUEFBa1MhvUx/Pg5o7zvdKwOu6y ORjRAgMLs8aAABgPMjAxMjEwMTEwOTUyNDJaoBEYDzIwMTIxMDEzMTAxMDIxWjAN BgkqhkiG9w0BAQUFAAOCAQEAWX7faLDXkmIdOv/IKBh7awhPmGUhFPVSrMI4dc9/ fcPDOYhFwWr9evKT/QdXRGpZY493mfa4Z6eEDxRDTexOloaiaJzVpSeV9hoJUxoS 8NEWDyi33bDlIJH6zru4kk1LpuSMiSWsvLaeoRhHmW3EPDeadpCa5tYX2yNW5hdP iCfphDJ34/hWHHwHP6mLd1wEO1Rw6nymqeDbuLk1FviD/ZWXMGzK8Sv++tmsQ0Tg 7XrkIPcSrozPKOTCf/1iJVF5KeQVIb0Ju1PvGUKtGaVTX8IZQmer2WQ1D6OOUcsS cWA6NSpWmScX/0/uBpXdSDX0AnGUS9SNrPNEolz6rA5OUaCCBL4wggS6MIIEtjCC Ap6gAwIBAgIDCpvzMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0Ex HjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2Vy dCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNl cnQub3JnMB4XDTExMDgyMzAwMDI1NloXDTEzMDgyMjAwMDI1NlowfDELMAkGA1UE BhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYDVQQKEwtD QWNlcnQgSW5jLjEeMBwGA1UECxMVU2VydmVyIEFkbWluaXN0cmF0aW9uMRgwFgYD VQQDEw9vY3NwLmNhY2VydC5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCcxtRv5CPHw3BLdR/k/K72YsRgodbP+UdAONmvBvWzhwm6B8h6O+M64sFr 2w6be7SYBECIyOQgNJ1flK4MoAWhdBA/H5NtxaDOKbAqA27tO9GaevcPp7c518O0 3hVnlPLvsN1f48nY0jQOXUTfv5nYXmD0OSSK/V3IRo0KsWB6T9UnMGCeEwb4Oqqz uzM0b4SBflzMEony/m6Tg/qL7qs2TLZAqe77+BZaVdFkDUnaBN7RyMruXySxeXiz mogT3WhROeloMa/X+E01bWBYBEK7VZIY9pgBpXQ7vDbbIGgYuIXUi20wh03WMy16 VDYdV0IUXHpidNUeK9W/BPP/7APBAgMBAAGjRDBCMAwGA1UdEwEB/wQCMAAwJwYD VR0lBCAwHgYIKwYBBQUHAwIGCCsGAQUFBwMBBggrBgEFBQcDCTAJBgNVHREEAjAA MA0GCSqGSIb3DQEBBQUAA4ICAQAoT6p5f3cGprAcgrnzdenfTmDe9LCW7k2VnazA MAzpsD6gXcSlo4+3hoHem/SpKRH2tqi34DmImCiv/S6fxsKM4Gfn5rlkAFviuTvS r5Zrwh4ZKSfaoWv4bmbzmcAxvuxdMWHf/5PbjegjzFTbBMekVPZY/abYtD6kdHQZ VNgzwZVfTBfYhfa+Rg72I2zjKpMsjxMqWfTmUzW6wfK6LFudZqu0U1NnJw+IlnVU 6WtjL885ebQrmcRqWz3nMhVLIu5L3w/s+VTLvm7If6jcMDNUjz8s2BPcJeCXg3TE STsyl6tvk17RRz2+9JskxVOk11xIn96xR4FCERIid2ek9z1xi7oYOajQF50i/9Gj ReDEfRSyb4/LzoKDOY+h4Q6jryeHh7WIHFiK5qrBN2y8qOoRJ/OqQnqci/BJBNpe g9Q9PJRgGSzRndTXNHiYRbeLpq7eGo3sPqlR9qBQ3rd98XGOU0RCMnzjKhENC3qo 5PkSF2xs8RmjWktFSTDwjYo0qf1teo7CGHjgaPjQ7JE8Q4ysFOQndSWmLpqwDcI9 HfIvPwUIWArQrJRh9LCNSyvHVgLqY9kw8NW4TlMxV2WqaYCkiKi3XVRrSFR3ahS1 VBvRZ8KpplrV7rhXjVSSqqfLk1sX3l72Ck2F9ON+qbNFmvhgNjSiBY9neMgo804a wG/paw== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISIC_D1_Issuer_ICA.pem000066400000000000000000000031371274666402600257020ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIEhjCCA26gAwIBAgILBAAAAAABL07hXdQwDQYJKoZIhvcNAQEFBQAwTDEgMB4G A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTEwNDEzMTAwMDAwWhcNMjIwNDEz MTAwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1z YTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBFeHRlbmRlZCBWYWxpZGF0aW9uIENBIC0g RzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNoUbMUpq4pbR/WNnN 2EugcgyXW6aIIMO5PUbc0FxSMPb6WU+FX7DbiLSpXysjSKyr9ZJ4FLYyD/tcaoVb AJDgu2X1WvlPZ37HbCnsk8ArysRe2LDb1r4/mwvAj6ldrvcAAqT8umYROHf+IyAl VRDFvYK5TLFoxuJwe4NcE2fBofN8C6iZmtDimyUxyCuNQPZSY7GgrVou9Xk2bTUs Dt0F5NDiB0i3KF4r1VjVbNAMoQFGAVqPxq9kx1UBXeHRxmxQJaAFrQCrDI1la93r wnJUyQ88ABeHIu/buYZ4FlGud9mmKE3zWI2DZ7k0JZscUYBR84OSaqOuR5rW5Isb wO2xAgMBAAGjggFaMIIBVjAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB /wIBADAdBgNVHQ4EFgQUsLBK/Rx1KPgcYaoT9vrBkD1rFqMwRwYDVR0gBEAwPjA8 BgRVHSAAMDQwMgYIKwYBBQUHAgEWJmh0dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29t L3JlcG9zaXRvcnkvMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwuZ2xvYmFs c2lnbi5uZXQvcm9vdC1yMi5jcmwwRAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzAB hihodHRwOi8vb2NzcC5nbG9iYWxzaWduLmNvbS9FeHRlbmRlZFNTTENBMCkGA1Ud JQQiMCAGCCsGAQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNwoDAzAfBgNVHSMEGDAW gBSb4gdXZxwewGoG3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAL0m28rZa pJWrnlrpK4KbzJBrfHRFIOde2Mcj7ig1sTVlKqVR4FU/9oNntOQ2KbDa7JeVqYoF o0X+Iy5SiLQfEICt0oufo1+oxetz3nmIQZgz7qdgGLFGyUAQB5yPClLJExoGbqCb LTr2rk/no1E1KlsYBRLlUdy2NmLz4aQP++TPw5S/EauhWTEB8MxT7I9j12yW00gq iiPtRVaoZkHqAblH7qFHDBTxI+Egc8p9UHxkOFejj0qcm+ltRc9Ea01gIEBxJbVG qmwIft/I+shWKpLLg7h5CZctXqEBzgbttJfJBNxB7+BPNk3kQHNG7BESfIhbNCYl TercGL7FG81kwQ== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISIC_D2_Issuer_Root.pem000066400000000000000000000023551274666402600262330ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp 1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE 38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4Q== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISIC_D3_Issuer_Root.pem000066400000000000000000000050111274666402600262240ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIHPTCCBSWgAwIBAgIBADANBgkqhkiG9w0BAQQFADB5MRAwDgYDVQQKEwdSb290 IENBMR4wHAYDVQQLExVodHRwOi8vd3d3LmNhY2VydC5vcmcxIjAgBgNVBAMTGUNB IENlcnQgU2lnbmluZyBBdXRob3JpdHkxITAfBgkqhkiG9w0BCQEWEnN1cHBvcnRA Y2FjZXJ0Lm9yZzAeFw0wMzAzMzAxMjI5NDlaFw0zMzAzMjkxMjI5NDlaMHkxEDAO BgNVBAoTB1Jvb3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEi MCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJ ARYSc3VwcG9ydEBjYWNlcnQub3JnMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAziLA4kZ97DYoB1CW8qAzQIxL8TtmPzHlawI229Z89vGIj053NgVBlfkJ 8BLPRoZzYLdufujAWGSuzbCtRRcMY/pnCujW0r8+55jE8Ez64AO7NV1sId6eINm6 zWYyN3L69wj1x81YyY7nDl7qPv4coRQKFWyGhFtkZip6qUtTefWIonvuLwphK42y fk1WpRPs6tqSnqxEQR5YYGUFZvjARL3LlPdCfgv3ZWiYUQXw8wWRBB0bF4LsyFe7 w2t6iPGwcswlWyCR7BYCEo8y6RcYSNDHBS4CMEK4JZwFaz+qOqfrU0j36NK2B5jc G8Y0f3/JHIJ6BVgrCFvzOKKrF11myZjXnhCLotLddJr3cQxyYN/Nb5gznZY0dj4k epKwDpUeb+agRThHqtdB7Uq3EvbXG4OKDy7YCbZZ16oE/9KTfWgu3YtLq1i6L43q laegw1SJpfvbi1EinbLDvhG+LJGGi5Z4rSDTii8aP8bQUWWHIbEZAWV/RRyH9XzQ QUxPKZgh/TMfdQwEUfoZd9vUFBzugcMd9Zi3aQaRIt0AUMyBMawSB3s42mhb5ivU fslfrejrckzzAeVLIL+aplfKkQABi6F1ITe1Yw1nPkZPcCBnzsXWWdsC4PDSy826 YreQQejdIOQpvGQpQsgi3Hia/0PsmBsJUUtaWsJx8cTLc6nloQsCAwEAAaOCAc4w ggHKMB0GA1UdDgQWBBQWtTIb1Mfz4OaO873SsDrusjkY0TCBowYDVR0jBIGbMIGY gBQWtTIb1Mfz4OaO873SsDrusjkY0aF9pHsweTEQMA4GA1UEChMHUm9vdCBDQTEe MBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0 IFNpZ25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2Vy dC5vcmeCAQAwDwYDVR0TAQH/BAUwAwEB/zAyBgNVHR8EKzApMCegJaAjhiFodHRw czovL3d3dy5jYWNlcnQub3JnL3Jldm9rZS5jcmwwMAYJYIZIAYb4QgEEBCMWIWh0 dHBzOi8vd3d3LmNhY2VydC5vcmcvcmV2b2tlLmNybDA0BglghkgBhvhCAQgEJxYl aHR0cDovL3d3dy5jYWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDBWBglghkgBhvhC AQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQg b3ZlciB0byBodHRwOi8vd3d3LmNhY2VydC5vcmcwDQYJKoZIhvcNAQEEBQADggIB ACjH7pyCArpcgBLKNQodgW+JapnM8mgPf6fhjViVPr3yBsOQWqy1YPaZQwGjiHCc nWKdpIevZ1gNMDY75q1I08t0AoZxPuIrA2jxNGJARjtT6ij0rPtmlVOKTV39O9lg 18p5aTuxZZKmxoGCXJzN600BiqXfEVWqFcofN8CCmHBh22p8lqOOLlQ+TyGpkO/c gr/c6EWtTZBzCDyUZbAEmXZ/4rzCahWqlwQ3JNgelE5tDlG+1sSPypZt90Pf6DBl Jzt7u0NDY8RD97LsaMzhGY4i+5jhe1o+ATc7iwiwovOVThrLm82asduycPAtStvY sONvRUgzEv/+PDIqVPfE94rwiCPCR/5kenHA0R6mY7AHfqQv0wGP3J8rtsYIqQ+T SCX8Ev2fQtzzxD72V7DX3WnRBnc0CkvSyqD/HMaMyRa+xMwyN2hzXwj7UfdJUzYF CpUCTPJ5GhD22Dp1nPMd8aINcGeGG7MW9S/lpOt5hvk9C8JzC6WZrG/8Z7jlLwum GCSNe9FINSkYQKyTYOGWhlC0elnYjyELn8+CkcY7v2vcB5G5l1YjqrZslMZIBjzk zk6q5PYvCdxTby78dOs6Y5nCpqyJvKeyRKANihDjbPIky/qbn3BHLt4Ui9SyIAmW omTxJBzcoTWcFbLUvFUufQb1nA5V9FrWk9p2rSVzTMVE -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISIC_ND1_Issuer_ICA.pem000066400000000000000000000034111274666402600260130ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIFBjCCA+6gAwIBAgIQEaO00OyNt3+doM1dLVEvQjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMDA1MjQwMDAw MDBaFw0yMDA1MzAxMDQ4MzhaMIGOMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDE0MDIGA1UEAxMrQ09NT0RPIEV4dGVuZGVkIFZhbGlkYXRp b24gU2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAMxKljPNJY1n7iiWN4dG8PYEooR/U6qW5h+xAhxu7X0h1Nc8HqLYaS+ot/Wi 7WRYZOFEZTZJQSABjTsT4gjzDPJXOZM3txyTRIOOvy3xoQV12m7ue28b6naDKHRK HCvT9cQDcpOvhs4JjDx11MkKL3Lzrb0OMDyEoXMfAyUUpY/D1vS15N2GevUZumjy hVSiMBHK0ZLLO3QGEqA3q2rYVBHfbJoWlLm0p2XGdC0x801S6VVRn8s+oo12mHDS b6ZlRS8bhbtbbfnywARmE4R6nc4n2PREnr+svpnba0/bWCGwiSe0jzLWS15ykV7f BZ3ZSS/0tm9QH3XLgJ3m0+TR8tMCAwEAAaOCAWkwggFlMB8GA1UdIwQYMBaAFAtY 5YvGTBU3pECpMKkhvkc2Wlb/MB0GA1UdDgQWBBSIRFH/UCppXi2I9CG62Qzyzsvq fDAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADA+BgNVHSAENzA1 MDMGBFUdIAAwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNv bS9DUFMwSQYDVR0fBEIwQDA+oDygOoY4aHR0cDovL2NybC5jb21vZG9jYS5jb20v Q09NT0RPQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdAYIKwYBBQUHAQEEaDBm MD4GCCsGAQUFBzAChjJodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9BZGRU cnVzdFNlcnZlckNBLmNydDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2Rv Y2EuY29tMA0GCSqGSIb3DQEBBQUAA4IBAQCaQ7+vpHJezX1vf/T8PYy7cOYe3QT9 P9ydn7+JdpvyhjH8f7PtKpFTLOKqsOPILHH3FYojHPFpLoH7sbxiC6saVBzZIl40 TKX2Iw9dej3bQ81pfhc3Us1TocIR1FN4J2TViUFNFlW7kMvw2OTd3dMJZEgo/zIj hC+Me1UvzymINzR4DzOq/7fylqSbRIC1vmxWVKukgZ4lGChUOn8sY89ZIIwYazgs tN3t40DeDDYlV5rA0WCeXgNol64aO+pF11GZSe5EWVYLXrGPaOqKnsrSyaADfnAl 9DLJTlCDh6I0SD1PNXf82Ijq9n0ezkO21cJqfjhmY03n7jLvDyToKmf7 -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISIC_ND2_Issuer_Root.pem000066400000000000000000000025471274666402600263540ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIID0DCCArigAwIBAgIQIKTEf93f4cdTYwcTiHdgEjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMTAxMDEwMDAw MDBaFw0zMDEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI 2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp +2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O nKVIrLsm9wIDAQABo0IwQDAdBgNVHQ4EFgQUC1jli8ZMFTekQKkwqSG+RzZaVv8w DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD ggEBAC/JxBwHO89hAgCx2SFRdXIDMLDEFh9sAIsQrK/xR9SuEDwMGvjUk2ysEDd8 t6aDZK3N3w6HM503sMZ7OHKx8xoOo/lVem0DZgMXlUrxsXrfViEGQo+x06iF3u6X HWLrp+cxEmbDD6ZLLkGC9/3JG6gbr+48zuOcrigHoSybJMIPIyaDMouGDx8rEkYl Fo92kANr3ryqImhrjKGsKxE5pttwwn1y6TPn/CbxdFqR5p2ErPioBhlG5qfpqjQi pKGfeq23sqSaM4hxAjwu1nqyH6LKwN0vEJT9s4yEIHlG1QXUEOTS22RPuFvuG8Ug R1uUq27UlTMdphVx8fiUylQ5PsI= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISIC_ND3_Issuer_Root.pem000066400000000000000000000027611274666402600263530ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290 MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9 uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0 WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0 Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgU= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISOP_D1.ors000066400000000000000000000037441274666402600237450ustar00rootroot00000000000000MIIFzwoBAKCCBcgwggXEBgkrBgEFBQcwAQEEggW1MIIFsTCBoKIWBBSpTXftIZX0 lLT9zwVSQC5Jfp3pqhgPMjAxMjEwMTAxMTU1NDVaMHUwczBLMAkGBSsOAwIaBQAE FKByDqBqfGICVPKo9Z3Se6Tzty+kBBSwsEr9HHUo+BxhqhP2+sGQPWsWowISESG8 vx4IzALnkqQG05AvM+2bgAAYDzIwMTIxMDEwMTAwMDAwWqARGA8yMDEyMTAxNzEw MDAwMFowCwYJKoZIhvcNAQEFA4IBAQCaiUf6TuPaSmZR2i3hUwqdEfhjcZkcCXPu 9diWuDZbaL6ubthfeTwx6OsZ0eM3Q+WPhBNlYQ9Sm8PDUQsQiq3YvuYu+QUisChx PN6BUEwFQZAGz+FX2h5+kAmK1M/xZeXMBCXJWJCClagiw5hOJfeV0ue7RUZRVuZv am0ZjyIeLsxsIrxghlcaJRosFmYNoM++euu5lvclutv1UQ5yyNxlYy0T/jA9gS07 WJ/i38+zxnXTuAPOm67p5N1IkEAEg/7OPRIG17Ig1C38NctN74vAOdTU1d/ay05V Bz4ZiI9PffkUkPgW2QRQCEjv50i80wYkKH5pIbT/mTk4t53DUK1UoIID+DCCA/Qw ggPwMIIC2KADAgECAhIRIcYjwu4UNkR1VGrDbSdFei8wDQYJKoZIhvcNAQEFBQAw WTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExLzAtBgNV BAMTJkdsb2JhbFNpZ24gRXh0ZW5kZWQgVmFsaWRhdGlvbiBDQSAtIEcyMB4XDTEy MDkxOTA3NDAzMVoXDTEyMTIxOTA4NDAzMVowgYUxCzAJBgNVBAYTAkJFMRkwFwYD VQQKExBHbG9iYWxTaWduIG52LXNhMUIwQAYDVQQDEzlHbG9iYWxTaWduIEV4dGVu ZGVkIFZhbGlkYXRpb24gQ0EgLSBHMiBPQ1NQIHJlc3BvbmRlciAtIDExFzAVBgNV BAUTDjIwMTIwOTE5MDkzOTAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAxkkb6QhDH3sEDj4zaysjVzYelq9lZ1cso4R2IyQxaoPaG6GkaCmHA4sz6KP+ m3ADqplibEUBa/mzCxHW8/oy3NhGMFdbezduZrnRFLbzakOTeIo8VEIM3JPfgREv CX8nj6Xu7ERD6JO/ZQ9Xr7YVzKKN+3cVZlcMHoGBnOPcO2Sz0AcYyk5m5IsGBRoT T86j6Cr9PhOPTVwXL6Wxy1KVHsUZXUwnRacV0O4SHWQ4zM9Sablus9fTbh1CgIqW sKDyzVB4yECXkBVeUlA+cuCaRRVHRiR+jPDSgbU62nnNudEpGG7dyoop6IOvXv2O ydncWzaukxIVvQ/Ij85kHqs7HQIDAQABo4GEMIGBMAkGA1UdEwQCMAAwDgYDVR0P AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAw HQYDVR0OBBYEFKlNd+0hlfSUtP3PBVJALkl+nemqMB8GA1UdIwQYMBaAFLCwSv0c dSj4HGGqE/b6wZA9axajMA0GCSqGSIb3DQEBBQUAA4IBAQCe4rZg61Dmwygl/Uae BJZog64/FvuB1sfCqKLJTjKOfLcugSTX1TT7bLJbzXRGPQuorI3TIZEOwldIw01d DTLlsOCHrfHd+bpxgijxPkUuaA4NYnpvqTEMJqPKOC8QYfKupNjAPSuHvwqvqCfO RCe3jY6xQDO0WCTZ8/xMsOkw+J/YEYqALETf2Ug7k5eRL/TvfLd8Sgi7vPfmUeiW ptlsbhMOWQoQc+JA3vCI01rrjNq+0kIZ/r8nPGvablRr0Aakk6eDuS2dcReaPwuK 0xE136pJYiXdQ3SA7uwmlorjxmejavyoPCr23TU74DQEt6hhc6uIcabsa4Y8KvJy RI4G certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISOP_D2.ors000066400000000000000000000037741274666402600237510ustar00rootroot00000000000000MIIF4AoBAKCCBdkwggXVBgkrBgEFBQcwAQEEggXGMIIFwjCBmaIWBBT0zghPr/K8 jV5hpjGMML9Q+DwzShgPMjAxMjEwMTAxMjA5NTlaMG4wbDBEMAkGBSsOAwIaBQAE FLdXtbacB/gWIxOOkMkqDr4yAaoxBBRge2YaRQ2XyolQL30EzTSo//z9SwILBAAA AAABL07hRxCAABgPMjAxMjEwMDEwNjAwMDBaoBEYDzIwMTMwNDE1MDYwMDAwWjAL BgkqhkiG9w0BAQUDggEBAGZY28eFWl169g7puLnKSeEzi6Ma5/rErOveFRp052ck 785B83HWkNmW/Bgw7Ws6Y7jBJce6ZQ5TMhwgNP34HuG/mVyn2ZjtCe4KKFBVnZV7 mHGx93jgKkQvdp4pbNKxZ504eZDp8UOlR9+uwWOWHVObn7o+2N8iWKErSbZ2uX54 Ajk8Hg/XN5wI4RUtcK3QpZSf3Ren5iit4NInwCpmTOkDz/IVK96BWaEQICq4VlHG ziD0H0SlBQCdcSPzZndGoCtIhNyJEL3O2y3Grg4X1XH7VeeyGesuTLEIAEMHJPJD TOVNoe5YPRK9Tqb+6jsubw8X/1b72kw3xVgb6MfC0tqgggQQMIIEDDCCBAgwggLw oAMCAQICCwQAAAAAAThXoveHMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRsw GQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwHhcNMTIwNzA1MTgwMDAwWhcNMTMw NzA1MTgwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu di1zYTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBPQ1NQIGZvciBSb290IFIxIC0gQnJh bmNoIDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMQY/h5DSRT24n mMtD19lrn8WZzOoIl+Z9qOsrLLjEQeTMDlL7JPZh5pLaHHb6kSWT+O/RcEwpw6Dq H9jtAgDOsGoN7gCK7wJbIvn4MdmkXZqVBcVl3uLuII3v1CPnlc/zoz5d9qXcZKb6 YuzseyzhDPecQ+7l2NVAUOFUj8GXOZi//bIveMsm+/zSLMfriIC84Uym2QY649SC aFNbtF/tR6upvLCLe0b2D1g+OBfGqZasi3QI5uX6lT0gHbCnPhRo3uxG2+S4KL3M 9sndMByrR5K6QuVf7UqA1vt0CfbA2OUXwcH5x3/TsHxtXDj2F/fWnC9QBBSN5n4I G8K7ZpYtAgMBAAGjgdIwgc8wDgYDVR0PAQH/BAQDAgeAMB0GA1UdDgQWBBT0zghP r/K8jV5hpjGMML9Q+DwzSjBMBgNVHSAERTBDMEEGCSsGAQQBoDIBXzA0MDIGCCsG AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMB8GA1UdIwQYMBaAFGB7ZhpF DZfKiVAvfQTNNKj//P1LMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQAD ggEBAGU9HIQImzhTHkQLyA178dUdnF5E3DdzmNtwVV3cxGrFOLMpciMQLioQ/xp5 t6j5Mshlp59imFylqowRRxRy4aN5TtMCufNh7yHIxI2Dt4O6qpPM946t5CJkMy+k 63pXz2xFIxaJDzAmzpWzu70OY0jrh3dZa8NR4AvhtoZ8zFE6suva6ZGK7JIoINaA j5uyZ0qU+7vFwV1awdReNV6494z/HRjs1n956mNbalB9mKp9XXyfZlix/nN5mTJd NlJqz7QjnCzZRM/Gfamzk8L3/CPS3XmSblFyn6SeZ92Vms4PNqZiEUNa2TMKXQR1 EMiDRMkyfIIMI80VgRvvzCiOt0c= certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISOP_D3.ors000066400000000000000000000045561274666402600237510ustar00rootroot00000000000000MIIG8AoBAKCCBukwggblBgkrBgEFBQcwAQEEggbWMIIG0jCB+aF+MHwxCzAJBgNV BAYTAkFVMQwwCgYDVQQIEwNOU1cxDzANBgNVBAcTBlN5ZG5leTEUMBIGA1UEChML Q0FjZXJ0IEluYy4xHjAcBgNVBAsTFVNlcnZlciBBZG1pbmlzdHJhdGlvbjEYMBYG A1UEAxMPb2NzcC5jYWNlcnQub3JnGA8yMDEyMTAxMDEzMjE1OVowZjBkMDwwCQYF Kw4DAhoFAAQUi6TJyxcpGUU+u45zCZG5JfKDImUEFBa1MhvUx/Pg5o7zvdKwOu6y ORjRAgMLs8aAABgPMjAxMjEwMTAxMzA1MjBaoBEYDzIwMTIxMDEyMTMyMTU5WjAN BgkqhkiG9w0BAQUFAAOCAQEAH1auyXFf1fOdfShSnAFkg5JsRUvajrilUioTkPIn IGYV//huaPNZwZGCC2haZIdUuKB6G2OCXeZVskBTXPjt8/6JmoHgsZeI3x5xKXxZ vddLC0PgYp0cA3FqjXR2UCpdBF+GK37rnfZsdW2vD9JaEBXxTV4+ICDAg15ZphJW lLGmdP3mQqPURIwamcYam8tntARimgEpA0KgfVue2A+izjcxC7qk9BQYG72Fh3hC ZFxi5u6xKNUQ2EBF9KXZyP9d2i/bYCZAUeUSRtir+fsOXHlihYRih9npKyAPwpHd NqhwK9NhKed8gmkX3cSaK0arBx7ev7avhM4Dqem+BzppjKCCBL4wggS6MIIEtjCC Ap6gAwIBAgIDCpvzMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0Ex HjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2Vy dCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNl cnQub3JnMB4XDTExMDgyMzAwMDI1NloXDTEzMDgyMjAwMDI1NlowfDELMAkGA1UE BhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYDVQQKEwtD QWNlcnQgSW5jLjEeMBwGA1UECxMVU2VydmVyIEFkbWluaXN0cmF0aW9uMRgwFgYD VQQDEw9vY3NwLmNhY2VydC5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCcxtRv5CPHw3BLdR/k/K72YsRgodbP+UdAONmvBvWzhwm6B8h6O+M64sFr 2w6be7SYBECIyOQgNJ1flK4MoAWhdBA/H5NtxaDOKbAqA27tO9GaevcPp7c518O0 3hVnlPLvsN1f48nY0jQOXUTfv5nYXmD0OSSK/V3IRo0KsWB6T9UnMGCeEwb4Oqqz uzM0b4SBflzMEony/m6Tg/qL7qs2TLZAqe77+BZaVdFkDUnaBN7RyMruXySxeXiz mogT3WhROeloMa/X+E01bWBYBEK7VZIY9pgBpXQ7vDbbIGgYuIXUi20wh03WMy16 VDYdV0IUXHpidNUeK9W/BPP/7APBAgMBAAGjRDBCMAwGA1UdEwEB/wQCMAAwJwYD VR0lBCAwHgYIKwYBBQUHAwIGCCsGAQUFBwMBBggrBgEFBQcDCTAJBgNVHREEAjAA MA0GCSqGSIb3DQEBBQUAA4ICAQAoT6p5f3cGprAcgrnzdenfTmDe9LCW7k2VnazA MAzpsD6gXcSlo4+3hoHem/SpKRH2tqi34DmImCiv/S6fxsKM4Gfn5rlkAFviuTvS r5Zrwh4ZKSfaoWv4bmbzmcAxvuxdMWHf/5PbjegjzFTbBMekVPZY/abYtD6kdHQZ VNgzwZVfTBfYhfa+Rg72I2zjKpMsjxMqWfTmUzW6wfK6LFudZqu0U1NnJw+IlnVU 6WtjL885ebQrmcRqWz3nMhVLIu5L3w/s+VTLvm7If6jcMDNUjz8s2BPcJeCXg3TE STsyl6tvk17RRz2+9JskxVOk11xIn96xR4FCERIid2ek9z1xi7oYOajQF50i/9Gj ReDEfRSyb4/LzoKDOY+h4Q6jryeHh7WIHFiK5qrBN2y8qOoRJ/OqQnqci/BJBNpe g9Q9PJRgGSzRndTXNHiYRbeLpq7eGo3sPqlR9qBQ3rd98XGOU0RCMnzjKhENC3qo 5PkSF2xs8RmjWktFSTDwjYo0qf1teo7CGHjgaPjQ7JE8Q4ysFOQndSWmLpqwDcI9 HfIvPwUIWArQrJRh9LCNSyvHVgLqY9kw8NW4TlMxV2WqaYCkiKi3XVRrSFR3ahS1 VBvRZ8KpplrV7rhXjVSSqqfLk1sX3l72Ck2F9ON+qbNFmvhgNjSiBY9neMgo804a wG/pag== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISOP_ND1.ors000066400000000000000000000011761274666402600240600ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBSIRFH/UCpp Xi2I9CG62QzyzsvqfBgPMjAxMjEwMTAwODU0NDVaMHMwcTBJMAkGBSsOAwIaBQAE FEi2DTgjjfhFbk7lhD6jlBEYApefBBSIRFH/UCppXi2I9CG62QzyzsvqfAIQIuEz IiCgSN8psr+aMcKbB4AAGA8yMDEyMTAxMDA4NTQ0NVqgERgPMjAxMjEwMTQwODU0 NDVaMA0GCSqGSIb3DQEBBQUAA4IBAQDHKDxWTbAHRXY7HapfhE99T+OSa/AfRYqX H9yIeMRa5VftXMyvBFuvVm/qLRwK6mxhkiVIvF/Pk5yxMjbm7xPO26D+WHOdQML4 +M4OX9BO76FjZRin5x+4b0Xo5SuSU1ulqfvSZnx+nG+hMbt/3Y7ODCEUWCYFoXNp U+TXTbv2mwJ9AL8Q/zjL4P8NJHzFJBKjEs+AAVRxTY/5RHHKU9dcm7ux/gsWoDUM w677Xxzn6icd8mqn72/HmzPnMrLHKKJFe2escbJn7JlV6qbZ9EWbrr+3OH0IJy5I E3LcPIsNZ//QEc6vS6J+j8ljV8Xne6rS1EmiOwV9NgubvYwDCm4R certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISOP_ND2.ors000066400000000000000000000011761274666402600240610ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBQLWOWLxkwV N6RAqTCpIb5HNlpW/xgPMjAxMjEwMTAwMDI1NTdaMHMwcTBJMAkGBSsOAwIaBQAE FOy+ZAvtiWulchtVZmfKU1ZI9ewTBBQLWOWLxkwVN6RAqTCpIb5HNlpW/wIQEaO0 0OyNt3+doM1dLVEvQoAAGA8yMDEyMTAxMDAwMjU1N1qgERgPMjAxMjEwMTQwMDI1 NTdaMA0GCSqGSIb3DQEBBQUAA4IBAQCJRXcrz4wJe7bqWBHULu/QDXVz74OhSNlu swI0J4h+UmzJuW1GpdhTwJcTG3ARVwCLKz3evvpvHSumcsop0G3NolryNLP/oGD0 Vf6PbLrJ8v+NxUNugPbtWM985Ti/B2a+XjbzYlH2vS3KOTL4X1zWSL07IQFNXc2h yHBscKpYgt0mZcFZFxN3NTCNpT6IjJzZzTG9xTYZ3hZdMQQ3DYO+/Hv4J+U1/Ybq CjuMWRak/0R/BiBDJdGhbThlvV7bNUxYY7DVaOiLER8ptpmhnzlB/vsTAxZqX48J mJdv2bxoTby98Pm/BMydEA9qcFqyP1XvqhzIY35ngoS/1XREyW7t certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ISOP_ND3.ors000066400000000000000000000012021274666402600240500ustar00rootroot00000000000000MIIB1AoBAKCCAc0wggHJBgkrBgEFBQcwAQEEggG6MIIBtjCBn6IWBBStvZh6NLQm 9/rEJlTvA73gJMtUGhgPMjAxMjEwMDkxNjAxNTNaMHQwcjBKMAkGBSsOAwIaBQAE FHyxZlScq9tE7mImFq30ZXv3etWUBBStvZh6NLQm9/rEJlTvA73gJMtUGgIRAKcN bJWejX5BTb8DmevkCauAABgPMjAxMjEwMDkxNjAxNTNaoBEYDzIwMTIxMDEzMTYw MTUzWjANBgkqhkiG9w0BAQUFAAOCAQEAFnJAzuT8P4KKyTI6sdj5HkQ352qEu5CN K9M2kU/eg9kPfwLv8z3yArobwgx+/IDRajbVAKrk8UPCGUqkDc0OiU5c0+jpn+nT 20VVCtWsBSWDfzKqYln/NGrblhv+/iuFZJpyfud5nWguW5nogPC8IAfgt9FMDMl6 wlQWLSWEkgAJWvhNR3nzgvyMnuDuMIVQgB9/+vAIxA7nlpEEh6KTswyGqE9+u1yC kvrz4PwKZQMT6r1eRCLs6NaagOZT84QHhZ6TAA+QHjfK406KL8F9mFgbGKbW+st2 QHm+giUhrgZMv+1Yaxe34BjDS439LCPjdZ29On8FeZr3F55T+s3VzA== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND1.ors000066400000000000000000000011761274666402600232260ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBSIRFH/UCpp Xi2I9CG62QzyzsvqfBgPMjAxMjEwMTEwODQxMTNaMHMwcTBJMAkGBSsOAwIaBQAE FEi2DTgjjfhFbk7lhD6jlBEYApefBBSIRFH/UCppXi2I9CG62QzyzsvqfAIQIuEz IiCgSN8psr+aMcKbB4AAGA8yMDEyMTAxMTA4NDExM1qgERgPMjAxMjEwMTUwODQx MTNaMA0GCSqGSIb3DQEBBQUAA4IBAQCNnhlBMxxh9z5AKfzAxiKs90CfxUsqfYfk 8XlyF9VIfWRfEwzS6MF1pEzLnghRxTAmjrFgK+sxD9wk+S5Mdgw3nbED9DVFH2Hs RGKm/t9wkvrYOX6yRQqw6uRvU/5cibMjcyzKB/VQMwk4p4FwSUgBv88A5sTkKr2V eYdEm34hg2TZVkipPMBiyTyBLXs8D/9oALtnczg4xlTRSjDUvqoXL5haqY4QK2Pv mNwna6ACkwLmSuMe29UQ8IX2PUB4R5Etni5czyiKGxZLm+4NAhuEwWFNEzCyImPc 087gHGU1zx+qVSlajqMJ/9ZXYjbt7WiWdhOTGEv4VMn8dHhRUs32 certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND1_Cert_EE.pem000066400000000000000000000043041274666402600245260ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIGTTCCBTWgAwIBAgIQIuEzIiCgSN8psr+aMcKbBzANBgkqhkiG9w0BAQUFADCB jjELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxNDAyBgNV BAMTK0NPTU9ETyBFeHRlbmRlZCBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIgQ0Ew HhcNMTEwMzMxMDAwMDAwWhcNMTMwNjI3MjM1OTU5WjCCAT8xETAPBgNVBAUTCDA0 MDU4NjkwMRMwEQYLKwYBBAGCNzwCAQMTAkdCMR0wGwYDVQQPExRQcml2YXRlIE9y Z2FuaXphdGlvbjELMAkGA1UEBhMCR0IxDzANBgNVBBETBk01IDNFUTEbMBkGA1UE CBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRYwFAYDVQQJ Ew1UcmFmZm9yZCBSb2FkMRYwFAYDVQQJEw1FeGNoYW5nZSBRdWF5MSUwIwYDVQQJ ExwzcmQgRmxvb3IsIDI2IE9mZmljZSBWaWxsYWdlMRowGAYDVQQKExFDT01PRE8g Q0EgTGltaXRlZDEaMBgGA1UECxMRQ29tb2RvIEVWIFNHQyBTU0wxGjAYBgNVBAMT EXNlY3VyZS5jb21vZG8uY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA168izw0zK6cChTGFuAwNARwTu1Ky/z+dXHkSmB0tQrAk3bq7mnUPtmQ+td8r G2hlhQPd+YXQVYEW3RuopydmdB9wMlEGCCfU2ZqohsC9uut+HenCVbYvn4sSB0KJ VdOXLPCEnfdk/FmcNWcYv73HmoJXZjT0THNQmnfpo6mMGAOerenMgNuCpq1buZ8c fFUeUY18ZGLZKZyRNM6GPgVA37Dm8Ru+9Cf8/rm7NSIoVWH4BDztM3Y1BZvZ0d4G 49jRA4MXbhsDEMYzaSCDmaRHSFhCtrGkN2S4A1ZxoSoxQVCLcnnInVd+J0X8J6pa Efio/aD6UQBQq29HyTsWVe6BewIDAQABo4IB8TCCAe0wHwYDVR0jBBgwFoAUiERR /1AqaV4tiPQhutkM8s7L6nwwHQYDVR0OBBYEFKvAXKp4bYRmxU4SlM8k8FbWiXiL MA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMDQGA1UdJQQtMCsGCCsGAQUF BwMBBggrBgEFBQcDAgYKKwYBBAGCNwoDAwYJYIZIAYb4QgQBMEYGA1UdIAQ/MD0w OwYMKwYBBAGyMQECAQUBMCswKQYIKwYBBQUHAgEWHWh0dHBzOi8vc2VjdXJlLmNv bW9kby5jb20vQ1BTMFMGA1UdHwRMMEowSKBGoESGQmh0dHA6Ly9jcmwuY29tb2Rv Y2EuY29tL0NPTU9ET0V4dGVuZGVkVmFsaWRhdGlvblNlY3VyZVNlcnZlckNBLmNy bDCBhAYIKwYBBQUHAQEEeDB2ME4GCCsGAQUFBzAChkJodHRwOi8vY3J0LmNvbW9k b2NhLmNvbS9DT01PRE9FeHRlbmRlZFZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5j cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTAzBgNVHREE LDAqghFzZWN1cmUuY29tb2RvLmNvbYIVd3d3LnNlY3VyZS5jb21vZG8uY29tMA0G CSqGSIb3DQEBBQUAA4IBAQC9SoVG+B40khDWAzlz+G0WDBM3OuqK5n8vY/XxdPS5 qyv6K05S4VRGR/6PQa1UVzMbnhfLh54OWrpnalRGabpTmKDu8Pa912pzDSzMxg4U Rff4/hVLd1n/58q+riLxdtkIigLUjtFfwUrE1H89QODOCb4nw7f9BQaDoug+ovM3 KO9rxVZ/3TshaxW0mPVM/cMbX+6RrQ7+d1y5fdX/fksCZhOW+P25+FPlaorQEWNa s0UZNQ6qVuxB7CPmnLqmLBfAKTbeKcQFxx//0eyyZqCkzIvYUNjeRR0Q7DnxXq4C Pj1Y6VcPJDmZOeogte5/vNIdU8Wq55IJJ1G/uKXztwVT -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND1_Issuer_ICA.pem000066400000000000000000000034111274666402600252040ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIFBjCCA+6gAwIBAgIQEaO00OyNt3+doM1dLVEvQjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMDA1MjQwMDAw MDBaFw0yMDA1MzAxMDQ4MzhaMIGOMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDE0MDIGA1UEAxMrQ09NT0RPIEV4dGVuZGVkIFZhbGlkYXRp b24gU2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAMxKljPNJY1n7iiWN4dG8PYEooR/U6qW5h+xAhxu7X0h1Nc8HqLYaS+ot/Wi 7WRYZOFEZTZJQSABjTsT4gjzDPJXOZM3txyTRIOOvy3xoQV12m7ue28b6naDKHRK HCvT9cQDcpOvhs4JjDx11MkKL3Lzrb0OMDyEoXMfAyUUpY/D1vS15N2GevUZumjy hVSiMBHK0ZLLO3QGEqA3q2rYVBHfbJoWlLm0p2XGdC0x801S6VVRn8s+oo12mHDS b6ZlRS8bhbtbbfnywARmE4R6nc4n2PREnr+svpnba0/bWCGwiSe0jzLWS15ykV7f BZ3ZSS/0tm9QH3XLgJ3m0+TR8tMCAwEAAaOCAWkwggFlMB8GA1UdIwQYMBaAFAtY 5YvGTBU3pECpMKkhvkc2Wlb/MB0GA1UdDgQWBBSIRFH/UCppXi2I9CG62Qzyzsvq fDAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADA+BgNVHSAENzA1 MDMGBFUdIAAwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNv bS9DUFMwSQYDVR0fBEIwQDA+oDygOoY4aHR0cDovL2NybC5jb21vZG9jYS5jb20v Q09NT0RPQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdAYIKwYBBQUHAQEEaDBm MD4GCCsGAQUFBzAChjJodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9BZGRU cnVzdFNlcnZlckNBLmNydDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2Rv Y2EuY29tMA0GCSqGSIb3DQEBBQUAA4IBAQCaQ7+vpHJezX1vf/T8PYy7cOYe3QT9 P9ydn7+JdpvyhjH8f7PtKpFTLOKqsOPILHH3FYojHPFpLoH7sbxiC6saVBzZIl40 TKX2Iw9dej3bQ81pfhc3Us1TocIR1FN4J2TViUFNFlW7kMvw2OTd3dMJZEgo/zIj hC+Me1UvzymINzR4DzOq/7fylqSbRIC1vmxWVKukgZ4lGChUOn8sY89ZIIwYazgs tN3t40DeDDYlV5rA0WCeXgNol64aO+pF11GZSe5EWVYLXrGPaOqKnsrSyaADfnAl 9DLJTlCDh6I0SD1PNXf82Ijq9n0ezkO21cJqfjhmY03n7jLvDyToKmf6 -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND2.ors000066400000000000000000000011761274666402600232270ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBQLWOWLxkwV N6RAqTCpIb5HNlpW/xgPMjAxMjEwMTAyMzAzMTlaMHMwcTBJMAkGBSsOAwIaBQAE FOy+ZAvtiWulchtVZmfKU1ZI9ewTBBQLWOWLxkwVN6RAqTCpIb5HNlpW/wIQEaO0 0OyNt3+doM1dLVEvQoAAGA8yMDEyMTAxMDIzMDMxOVqgERgPMjAxMjEwMTQyMzAz MTlaMA0GCSqGSIb3DQEBBQUAA4IBAQCHn2nGfEUX/EJruMkTgh7GgB0u9cpAepaD sPv9gtl3KLUZyR+NbGMIa5/bpoJp0yg1z5VL6CLMusy3AF6Cn2fyaioDxG+yc+gA PcPFdEqiIMr+TP8s7qcEiE6WZddSSCqCn90VZSCWkpDhnCjDRwJLBBPU3803fdMz oguvyr7y6Koxik8X/iUe8EpSzAvmm4GZL3veTI+x7IezJSrhCS9zM0ZHjySjoDxC +ljGH0EuWPTmFEqZVGIq3cuahIYzKItUbYnXU6ipi/2p42qbsFeok7eEN0EYsY1a vRATHGRmU7Q5HLCq4rQtZC1cis52Mvc9x1W4z/Gt5A3FtgElXXNA certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND2_Cert_ICA.pem000066400000000000000000000034111274666402600246300ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIFBjCCA+6gAwIBAgIQEaO00OyNt3+doM1dLVEvQjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMDA1MjQwMDAw MDBaFw0yMDA1MzAxMDQ4MzhaMIGOMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDE0MDIGA1UEAxMrQ09NT0RPIEV4dGVuZGVkIFZhbGlkYXRp b24gU2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAMxKljPNJY1n7iiWN4dG8PYEooR/U6qW5h+xAhxu7X0h1Nc8HqLYaS+ot/Wi 7WRYZOFEZTZJQSABjTsT4gjzDPJXOZM3txyTRIOOvy3xoQV12m7ue28b6naDKHRK HCvT9cQDcpOvhs4JjDx11MkKL3Lzrb0OMDyEoXMfAyUUpY/D1vS15N2GevUZumjy hVSiMBHK0ZLLO3QGEqA3q2rYVBHfbJoWlLm0p2XGdC0x801S6VVRn8s+oo12mHDS b6ZlRS8bhbtbbfnywARmE4R6nc4n2PREnr+svpnba0/bWCGwiSe0jzLWS15ykV7f BZ3ZSS/0tm9QH3XLgJ3m0+TR8tMCAwEAAaOCAWkwggFlMB8GA1UdIwQYMBaAFAtY 5YvGTBU3pECpMKkhvkc2Wlb/MB0GA1UdDgQWBBSIRFH/UCppXi2I9CG62Qzyzsvq fDAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADA+BgNVHSAENzA1 MDMGBFUdIAAwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNv bS9DUFMwSQYDVR0fBEIwQDA+oDygOoY4aHR0cDovL2NybC5jb21vZG9jYS5jb20v Q09NT0RPQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdAYIKwYBBQUHAQEEaDBm MD4GCCsGAQUFBzAChjJodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9BZGRU cnVzdFNlcnZlckNBLmNydDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2Rv Y2EuY29tMA0GCSqGSIb3DQEBBQUAA4IBAQCaQ7+vpHJezX1vf/T8PYy7cOYe3QT9 P9ydn7+JdpvyhjH8f7PtKpFTLOKqsOPILHH3FYojHPFpLoH7sbxiC6saVBzZIl40 TKX2Iw9dej3bQ81pfhc3Us1TocIR1FN4J2TViUFNFlW7kMvw2OTd3dMJZEgo/zIj hC+Me1UvzymINzR4DzOq/7fylqSbRIC1vmxWVKukgZ4lGChUOn8sY89ZIIwYazgs tN3t40DeDDYlV5rA0WCeXgNol64aO+pF11GZSe5EWVYLXrGPaOqKnsrSyaADfnAl 9DLJTlCDh6I0SD1PNXf82Ijq9n0ezkO21cJqfjhmY03n7jLvDyToKmf6 -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND2_Issuer_Root.pem000066400000000000000000000025471274666402600255450ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIID0DCCArigAwIBAgIQIKTEf93f4cdTYwcTiHdgEjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMTAxMDEwMDAw MDBaFw0zMDEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI 2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp +2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O nKVIrLsm9wIDAQABo0IwQDAdBgNVHQ4EFgQUC1jli8ZMFTekQKkwqSG+RzZaVv8w DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD ggEBAC/JxBwHO89hAgCx2SFRdXIDMLDEFh9sAIsQrK/xR9SuEDwMGvjUk2ysEDd8 t6aDZK3N3w6HM503sMZ7OHKx8xoOo/lVem0DZgMXlUrxsXrfViEGQo+x06iF3u6X HWLrp+cxEmbDD6ZLLkGC9/3JG6gbr+48zuOcrigHoSybJMIPIyaDMouGDx8rEkYl Fo92kANr3ryqImhrjKGsKxE5pttwwn1y6TPn/CbxdFqR5p2ErPioBhlG5qfpqjQi pKGfeq23sqSaM4hxAjwu1nqyH6LKwN0vEJT9s4yEIHlG1QXUEOTS22RPuFvuG8Ug R1uUq27UlTMdphVx8fiUylQ5PsE= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND3.ors000066400000000000000000000012021274666402600232160ustar00rootroot00000000000000MIIB1AoBAKCCAc0wggHJBgkrBgEFBQcwAQEEggG6MIIBtjCBn6IWBBStvZh6NLQm 9/rEJlTvA73gJMtUGhgPMjAxMjEwMTExMTM2NDdaMHQwcjBKMAkGBSsOAwIaBQAE FHyxZlScq9tE7mImFq30ZXv3etWUBBStvZh6NLQm9/rEJlTvA73gJMtUGgIRAKcN bJWejX5BTb8DmevkCauAABgPMjAxMjEwMTExMTM2NDdaoBEYDzIwMTIxMDE1MTEz NjQ3WjANBgkqhkiG9w0BAQUFAAOCAQEAfnj3nh6z+USW6VlDWRytWpNmC1ZRwWlg P2+G4UF4HE8bMJkuiFLcZEVYTxlTYv+xAEpSFxdInFM2Q5C+O6pWOZ9NbikeR4oZ FTI1kAZ0Uw+YMpVM4ztvKBIpUSqlbi69iNJ9WGF6qzxVeqobSOyrjjwtTsuglUbR +mshp/SP7Br2IIK+KM1vgsmVExPfGPYANyk7ki/Q8uUnjqkreeSa9WC2iJLGcybW YavDhYWALebUGukNeedkloYhdjPboPPxDkKNjakwIG8EkbJK7uXewMOHHOFvFTX3 K388me8u5iQf4f3fj6ilEgs6f5Szzmb+vklPX0zIny/TVk2+Az7HmA== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND3_Cert_EE.pem000066400000000000000000000040561274666402600245340ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIF3TCCBMWgAwIBAgIRAKcNbJWejX5BTb8DmevkCaswDQYJKoZIhvcNAQEFBQAw bzELMAkGA1UEBhMCU0UxFDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1B ZGRUcnVzdCBFeHRlcm5hbCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3Qg RXh0ZXJuYWwgQ0EgUm9vdDAeFw0xMDA1MDQwMDAwMDBaFw0xNTA1MDQyMzU5NTla MIIBCjELMAkGA1UEBhMCR0IxDzANBgNVBBETBk01IDNFUTEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRYwFAYDVQQJEw1UcmFm Zm9yZCBSb2FkMRYwFAYDVQQJEw1FeGNoYW5nZSBRdWF5MSUwIwYDVQQJExwzcmQg Rmxvb3IsIDI2IE9mZmljZSBWaWxsYWdlMRowGAYDVQQKExFDT01PRE8gQ0EgTGlt aXRlZDEaMBgGA1UECxMRQ29tb2RvIFByZW1pdW1TU0wxLDAqBgNVBAMTI2FkZHRy dXN0ZXh0ZXJuYWxjYXJvb3QuY29tb2RvY2EuY29tMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAz5MM/mco91yFJNtF3t9c0x/bGds+zGAqJlHBXCR43og+ 3vgsBkCcn5M3PAqmL6XxilpsrEfS6RqtNcLfxwDyl7rr3qpJSM537Km1ZGOTHs0C i0JA4YBZFOxBwPO2nHQGD+t9kJx3auFdBLnjJc5Q3jFUmnyJ8D2h3P9BrHgOoIbO KYOUc/3zcqE6NttdbiuUMzlad8guhnXlWPCh2NJtNtMLDQxG7DWWDEm/Kt+CdKAR jko6kEp7nqBKyujjJoGD2nEtEnuuqiB9n6sgSXR1NGtecJrW8IqIS7hkcsxhGTI9 jnY73+NiMV3nglejkNseTUdcEi6L94EdifXuVLgEAwIDAQABo4IB1TCCAdEwHwYD VR0jBBgwFoAUrb2YejS0Jvf6xCZU7wO94CTLVBowHQYDVR0OBBYEFDXpt6NocCrd 7XZ2MLUa116TIesKMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMB0GA1Ud JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBGBgNVHSAEPzA9MDsGDCsGAQQBsjEB AgEDBDArMCkGCCsGAQUFBwIBFh1odHRwczovL3NlY3VyZS5jb21vZG8ubmV0L0NQ UzB7BgNVHR8EdDByMDigNqA0hjJodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9BZGRU cnVzdEV4dGVybmFsQ0FSb290LmNybDA2oDSgMoYwaHR0cDovL2NybC5jb21vZG8u bmV0L0FkZFRydXN0RXh0ZXJuYWxDQVJvb3QuY3JsMDQGCCsGAQUFBwEBBCgwJjAk BggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2RvY2EuY29tMFcGA1UdEQRQME6C I2FkZHRydXN0ZXh0ZXJuYWxjYXJvb3QuY29tb2RvY2EuY29tgid3d3cuYWRkdHJ1 c3RleHRlcm5hbGNhcm9vdC5jb21vZG9jYS5jb20wDQYJKoZIhvcNAQEFBQADggEB AF2TF6xg8ZoBICoiQvjD2Z0SKcJRw1Dhj3HpGzV9F+Y0e/MxCXhYA+340JZxnC2P VA968QKFrNwDWiS9Klc+cs4k3HIeiZp3uHw1ezElqXXNa+S1CrSS03FqWeeugSrB xpuXCWDJSfD4DJq835hlEuXgxmAjsbuRUjaq1lxwSWnNoBkfMCCAgVlHtFljTlqq nwfBZcnj73+yiERgTvhN4gEL59ZzjFliKEUuXHZoe8klhn73cnY+XoRV0e7wU+Xj PzLoAhjGkS35hfDQTHdCwNBaN3iI2Q+HBjhfffAYFdK+Jo3kSXq12s7CJD7utAho xxRhA0l1ziJgrEubLi6ItNg= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/ND3_Issuer_Root.pem000066400000000000000000000027611274666402600255440ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290 MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9 uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0 WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0 Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/R2.pem000066400000000000000000000025111274666402600230770ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIDujCCAqKgAwIBAgILBAAAAAABD4Ym5g0wDQYJKoZIhvcNAQEFBQAwTDEgMB4G A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDYxMjE1MDgwMDAwWhcNMjExMjE1 MDgwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMjETMBEG A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAKbPJA6+Lm8omUVCxKs+IVSbC9N/hHD6ErPL v4dfxn+G07IwXNb9rfF73OX4YJYJkhD10FPe+3t+c4isUoh7SqbKSaZeqKeMWhG8 eoLrvozps6yWJQeXSpkqBy+0Hne/ig+1AnwblrjFuTosvNYSuetZfeLQBoZfXklq tTleiDTsvHgMCJiEbKjNS7SgfQx5TfC4LcshytVsW33hoCmEofnTlEnLJGKRILzd C9XZzPnqJworc5HGnRusyMvo4KD0L5CLTfuwNhv2GXqF4G3yYROIXJ/gkwpRl4pa zq+r1feqCapgvdzZX99yqWATXgAByUr6P6TqBwMhAo6CygPCm48CAwEAAaOBnDCB mTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUm+IH V2ccHsBqBt5ZtJot39wZhi4wNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5n bG9iYWxzaWduLm5ldC9yb290LXIyLmNybDAfBgNVHSMEGDAWgBSb4gdXZxwewGoG 3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAmYFThxxol4aR7OBKuEQLq4Gs J0/WwbgcQ3izDJr86iw8bmEbTUsp9Z8FHSbBuOmDAGJFtqkIk7mpM0sYmsL4h4hO 291xNBrBVNpGP+DTKqttVCL1OmLNIG+6KYnX3ZHu01yiPqFbQfXf5WRDLenVOavS ot+3i9DAgBkcRcAtjOj4LaR0VknFBbVPFd5uRHg5h6h+u/N5GJG79G+dwfCMNYxd AfvDbbnvRG15RjF+Cv6pgsH/76tuIMRQyV+dTZsXjAzlAcmgQWpzU/qlULRuJQ/7 TBj0/VLZjmmx6BEP3ojY+x1J96relc8geMJgEtslQIxq/H5COEBkEveegeGTLg== -----END CERTIFICATE-----certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WIKH_D1.ors000066400000000000000000000037441274666402600237350ustar00rootroot00000000000000MIIFzwoBAKCCBcgwggXEBgkrBgEFBQcwAQEEggW1MIIFsTCBoKIWBBRf2uQDFpGg Ywh4P1y2H9bZ2/BQNBgPMjAxMjEwMTExMzI5NDJaMHUwczBLMAkGBSsOAwIaBQAE FKByDqBqfGICVPKo9Z3Se6Tzty+kBBSxsEr9HHUo+BxhqhP2+sGQPWsWowISESG8 vx4IzALnkqQG05AvM+2bgAAYDzIwMTIxMDExMTAwMDAwWqARGA8yMDEyMTAxODEw MDAwMFowCwYJKoZIhvcNAQEFA4IBAQCX3gEX+JVfxuYmxBBxC9sNCi3o76ODIicr XMvm0DTO9VSyDBl7LDsMMgNMIDtO3flQSlBNZ2B9ikwyckXOSWXiXzybZVMdA/uq NchgkM9aChrlhG0AHZyYe/+dJSmEBFXkIomy+S6YQ7Mcs2s6WxCeWU7gB4XOy1zO /CvWjv0WQV1J2lZZ6pkvtECKAEjrVP275LA38HInFbYvVPXWzl4sDcX2TAxwUa4S xAJAfwl+B+oZSerZWGRo6KjZuB/OB31cB5n/lABmRez6Obi27D0UUCRv/eSbwOF4 Ofaa/XzJt7sF7WpVgoR41HI88W7aN4vtcw1zcVsBmfRMUNYZSqtfoIID+DCCA/Qw ggPwMIIC2KADAgECAhIRISdENsrz1CSWG3VIBwfQERQwDQYJKoZIhvcNAQEFBQAw WTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExLzAtBgNV BAMTJkdsb2JhbFNpZ24gRXh0ZW5kZWQgVmFsaWRhdGlvbiBDQSAtIEcyMB4XDTEy MDkxOTA3NDA1MFoXDTEyMTIxOTA4NDA1MFowgYUxCzAJBgNVBAYTAkJFMRkwFwYD VQQKExBHbG9iYWxTaWduIG52LXNhMUIwQAYDVQQDEzlHbG9iYWxTaWduIEV4dGVu ZGVkIFZhbGlkYXRpb24gQ0EgLSBHMiBPQ1NQIHJlc3BvbmRlciAtIDIxFzAVBgNV BAUTDjIwMTIwOTE5MDk0MDAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnCgMsBO+IxIqCnXCOfXJoIC3wj+f0s4DV9h2gJBzisWXkaJD2DfNrd0kHUXK qVVPUxnA4G5iZu0Z385/KiOt1/P6vQ/Z2/AsEh/8Z/hIyeZCHL31wrSZW4yLeZwi M76wPiBHJxPun681HQlVs/OGKSHnbHc1XJAIeA/M8u+lLWqIKB+AJ82TrOqUMj1s LjGhQNs84xPliONN5K7DrEy+Y65X/rFxN77Smw+UtcH1GgH2NgaHH8dpt1m25sgm UxZWhdx66opB/lbRQwWdGt7MC0kJFaWHDZq64DTuYoekFYSxAFu0nd0EekEHEJEi 9mquB9cv/96SuEJl8BcUWU/1LwIDAQABo4GEMIGBMAkGA1UdEwQCMAAwDgYDVR0P AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAw HQYDVR0OBBYEFF/a5AMWkaBjCHg/XLYf1tnb8FA0MB8GA1UdIwQYMBaAFLCwSv0c dSj4HGGqE/b6wZA9axajMA0GCSqGSIb3DQEBBQUAA4IBAQCKRl1iXFmOQtLseDWP Y5icDDBGiRi17CGgvIzGJi/ha0PhbO+X0TmQIEnRX3Mu0Er/Mm4RZSjMtJ2iZRh3 tGf4Dn+jKgKOmgXC3oOG/l8RPHLf0yaPSdn/z0TXtA30vTFBLlFeWnhbfhovea4+ snPdBxLqWZdtxmiwojgqA7YATCWwavizrBr09YRyDwzgtpZ2BwMruGuFuV9FsEwL PCM53yFlrM32oFghyfyE5kYjgnnueKM+pw1kA0jgb1CnVJRrMEN1TXuXDAZLtHKG 5X/drah1JtkoZhCzxzZ3bYdVDQJ90OHFqM58lwGD6z3XuPKrHDKZKt+CPIsl5g7p 4J2l certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WIKH_D2.ors000066400000000000000000000037741274666402600237410ustar00rootroot00000000000000MIIF4AoBAKCCBdkwggXVBgkrBgEFBQcwAQEEggXGMIIFwjCBmaIWBBTqlwecTarB yVdbHxANRLCFYj1mqBgPMjAxMjEwMTExMzMwMTBaMG4wbDBEMAkGBSsOAwIaBQAE FLdXtbacB/gWIxOOkMkqDr4yAaoxBBRhe2YaRQ2XyolQL30EzTSo//z9SwILBAAA AAABL07hRxCAABgPMjAxMjEwMDEwNjAwMDBaoBEYDzIwMTMwNDE1MDYwMDAwWjAL BgkqhkiG9w0BAQUDggEBAA0H7bvcULg1GayFtQVrYDyW0feOEMNGLmgaGuwRdrY3 KuWyNJLUUJKQZnOkdT8A4RpVX8xD4EgVyOqRACUahgdgp0g3QOn+vf2Zyf+NJIgW woF5qaJgCOeIOw5O6F4r1vUhp8NvqXHotswgG58Nzz6UMD+uyIgq5o8uzOjryEm6 wO2X+KvN9sMzkeZhNvAHkgBQL8CG4CggWnzn7At1DmhhsizfhDrosigM4Zr6Sm6z v1YfSPznD0b3TQ7RzvpbJPofF2aJXMIMxdKR5pemuevTDR2+JCXjVPsD/ZODFykc rsQeqx2vTOIg84PRKboXjCAwHn4rIN7JJtQqebLtD9egggQQMIIEDDCCBAgwggLw oAMCAQICCwQAAAAAAThXovYBMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRsw GQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwHhcNMTIwNzA1MTgwMDAwWhcNMTMw NzA1MTgwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu di1zYTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBPQ1NQIGZvciBSb290IFIxIC0gQnJh bmNoIDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDP2QF8p0+Fb7ID MwwD1gEr2oazjqbW28EZr3YEyMPk+7VFaGePSO1xjBGIE48Q7m7d6p6ZXCzlBZEi oudrHSr3WDqdIVKLDrZIDkgEgdjJE72Hq6Pf5CEGXyebbODm4sV96EfewSvOOYLL 866g3aoVhLDK02ny+Q5OsokW7nhnmGMMh10tZqR5VmdQTiw8MgeqUxBEaEO4WH2J ltgSsgNJBNBYuDgnn5ryzVqhvmCJvYZMYeN6qZFKy1MgHcR+wEpGLPlRL4ttu6e5 MJrVta7dVFobHUHoFog97LtQT1PY0Ubaihswjge5O04bYeCrgSSjr1e4xH/KDxRw yyhoscaFAgMBAAGjgdIwgc8wDgYDVR0PAQH/BAQDAgeAMB0GA1UdDgQWBBTqlwec TarByVdbHxANRLCFYj1mqDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBXzA0MDIGCCsG AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMB8GA1UdIwQYMBaAFGB7ZhpF DZfKiVAvfQTNNKj//P1LMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQAD ggEBAHiC6N1uF29d7CmiVapA8Nr1xLSVeIkBd4A8yHsUTQ7ATI7bwT14QUV4awe7 8cvmO5ZND8YG1ViwN162WFm9ivSoWBzvWDbU2JhQFb+XzrzCcdn0YbNiTxJh/vYm uDuxto00dpBgujSOAQv8B90iDEJ+sZpYRzDRj62qStRey0zpq5eX+pA+gdppMUFb 4QvJf0El8TbLCWLN4TjrFe6ju7ZaN9zmgVYGQ2fMHKIGNScLuIA950nYwzRkIfHa YW6HqP1rCR1EiYmstEeCQyDxJx+RUlh+q8L1BKzaMYhS6s63MZzQuGseYStaCmbC fBIRKjnK621vAWvc7UR+0hqnZ+U= certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WIKH_D3.ors000066400000000000000000000045561274666402600237410ustar00rootroot00000000000000MIIG8AoBAKCCBukwggblBgkrBgEFBQcwAQEEggbWMIIG0jCB+aF+MHwxCzAJBgNV BAYTAkFVMQwwCgYDVQQIEwNOU1cxDzANBgNVBAcTBlN5ZG5leTEUMBIGA1UEChML Q0FjZXJ0IEluYy4xHjAcBgNVBAsTFVNlcnZlciBBZG1pbmlzdHJhdGlvbjEYMBYG A1UEAxMPb2NzcC5jYWNlcnQub3JnGA8yMDEyMTAxMTE0MDYzNlowZjBkMDwwCQYF Kw4DAhoFAAQUi6TJyxcpGUU+u45zCZG5JfKDImUEFBe1MhvUx/Pg5o7zvdKwOu6y ORjRAgMLs8aAABgPMjAxMjEwMTExMzU4MTBaoBEYDzIwMTIxMDEzMTQwNjM2WjAN BgkqhkiG9w0BAQUFAAOCAQEAjcryO6FUK5+TcPBxJKixVt9q07Xy3qv1e/VFuJ0f tnYDcu83Q5yCta49PXaA13nFDFZ445wCDivDBLolS6JKSh+JrLpAxSBzak7Ps8wz DPNAtexZz9/hPPzHnGOMlRtew07jk+NX5ZgCxDZGmBHIHOGyab2WoqmpRTll0oP4 b/DzI3mzrur5lm2NAT3ZJ8bVaWsAJBVTfUye3S4GRWlfGSRVAMk0QHnCkYP42okc psIKbvdIoS2gxo6kBTMevxciPV2lPIiSrIWH0IGm7AqGM5+Vz7IdbD6fOQd1I3uw O+1NugMYfScB6jCvSW2uESeRZ+qW/HMXQbU1eiH+x88UIKCCBL4wggS6MIIEtjCC Ap6gAwIBAgIDCpvzMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0Ex HjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2Vy dCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNl cnQub3JnMB4XDTExMDgyMzAwMDI1NloXDTEzMDgyMjAwMDI1NlowfDELMAkGA1UE BhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYDVQQKEwtD QWNlcnQgSW5jLjEeMBwGA1UECxMVU2VydmVyIEFkbWluaXN0cmF0aW9uMRgwFgYD VQQDEw9vY3NwLmNhY2VydC5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCcxtRv5CPHw3BLdR/k/K72YsRgodbP+UdAONmvBvWzhwm6B8h6O+M64sFr 2w6be7SYBECIyOQgNJ1flK4MoAWhdBA/H5NtxaDOKbAqA27tO9GaevcPp7c518O0 3hVnlPLvsN1f48nY0jQOXUTfv5nYXmD0OSSK/V3IRo0KsWB6T9UnMGCeEwb4Oqqz uzM0b4SBflzMEony/m6Tg/qL7qs2TLZAqe77+BZaVdFkDUnaBN7RyMruXySxeXiz mogT3WhROeloMa/X+E01bWBYBEK7VZIY9pgBpXQ7vDbbIGgYuIXUi20wh03WMy16 VDYdV0IUXHpidNUeK9W/BPP/7APBAgMBAAGjRDBCMAwGA1UdEwEB/wQCMAAwJwYD VR0lBCAwHgYIKwYBBQUHAwIGCCsGAQUFBwMBBggrBgEFBQcDCTAJBgNVHREEAjAA MA0GCSqGSIb3DQEBBQUAA4ICAQAoT6p5f3cGprAcgrnzdenfTmDe9LCW7k2VnazA MAzpsD6gXcSlo4+3hoHem/SpKRH2tqi34DmImCiv/S6fxsKM4Gfn5rlkAFviuTvS r5Zrwh4ZKSfaoWv4bmbzmcAxvuxdMWHf/5PbjegjzFTbBMekVPZY/abYtD6kdHQZ VNgzwZVfTBfYhfa+Rg72I2zjKpMsjxMqWfTmUzW6wfK6LFudZqu0U1NnJw+IlnVU 6WtjL885ebQrmcRqWz3nMhVLIu5L3w/s+VTLvm7If6jcMDNUjz8s2BPcJeCXg3TE STsyl6tvk17RRz2+9JskxVOk11xIn96xR4FCERIid2ek9z1xi7oYOajQF50i/9Gj ReDEfRSyb4/LzoKDOY+h4Q6jryeHh7WIHFiK5qrBN2y8qOoRJ/OqQnqci/BJBNpe g9Q9PJRgGSzRndTXNHiYRbeLpq7eGo3sPqlR9qBQ3rd98XGOU0RCMnzjKhENC3qo 5PkSF2xs8RmjWktFSTDwjYo0qf1teo7CGHjgaPjQ7JE8Q4ysFOQndSWmLpqwDcI9 HfIvPwUIWArQrJRh9LCNSyvHVgLqY9kw8NW4TlMxV2WqaYCkiKi3XVRrSFR3ahS1 VBvRZ8KpplrV7rhXjVSSqqfLk1sX3l72Ck2F9ON+qbNFmvhgNjSiBY9neMgo804a wG/pag== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WIKH_ND1.ors000066400000000000000000000011761274666402600240500ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBSIRFH/UCpp Xi2I9CG62QzyzsvqfBgPMjAxMjEwMTEwODQxMTNaMHMwcTBJMAkGBSsOAwIaBQAE FEi2DTgjjfhFbk7lhD6jlBEYApefBBSJRFH/UCppXi2I9CG62QzyzsvqfAIQIuEz IiCgSN8psr+aMcKbB4AAGA8yMDEyMTAxMTA4NDExM1qgERgPMjAxMjEwMTUwODQx MTNaMA0GCSqGSIb3DQEBBQUAA4IBAQCNnhlBMxxh9z5AKfzAxiKs90CfxUsqfYfk 8XlyF9VIfWRfEwzS6MF1pEzLnghRxTAmjrFgK+sxD9wk+S5Mdgw3nbED9DVFH2Hs RGKm/t9wkvrYOX6yRQqw6uRvU/5cibMjcyzKB/VQMwk4p4FwSUgBv88A5sTkKr2V eYdEm34hg2TZVkipPMBiyTyBLXs8D/9oALtnczg4xlTRSjDUvqoXL5haqY4QK2Pv mNwna6ACkwLmSuMe29UQ8IX2PUB4R5Etni5czyiKGxZLm+4NAhuEwWFNEzCyImPc 087gHGU1zx+qVSlajqMJ/9ZXYjbt7WiWdhOTGEv4VMn8dHhRUs32 certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WIKH_ND2.ors000066400000000000000000000011761274666402600240510ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBQLWOWLxkwV N6RAqTCpIb5HNlpW/xgPMjAxMjEwMTAyMzAzMTlaMHMwcTBJMAkGBSsOAwIaBQAE FOy+ZAvtiWulchtVZmfKU1ZI9ewTBBQMWOWLxkwVN6RAqTCpIb5HNlpW/wIQEaO0 0OyNt3+doM1dLVEvQoAAGA8yMDEyMTAxMDIzMDMxOVqgERgPMjAxMjEwMTQyMzAz MTlaMA0GCSqGSIb3DQEBBQUAA4IBAQCHn2nGfEUX/EJruMkTgh7GgB0u9cpAepaD sPv9gtl3KLUZyR+NbGMIa5/bpoJp0yg1z5VL6CLMusy3AF6Cn2fyaioDxG+yc+gA PcPFdEqiIMr+TP8s7qcEiE6WZddSSCqCn90VZSCWkpDhnCjDRwJLBBPU3803fdMz oguvyr7y6Koxik8X/iUe8EpSzAvmm4GZL3veTI+x7IezJSrhCS9zM0ZHjySjoDxC +ljGH0EuWPTmFEqZVGIq3cuahIYzKItUbYnXU6ipi/2p42qbsFeok7eEN0EYsY1a vRATHGRmU7Q5HLCq4rQtZC1cis52Mvc9x1W4z/Gt5A3FtgElXXNA certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WIKH_ND3.ors000066400000000000000000000012021274666402600240400ustar00rootroot00000000000000MIIB1AoBAKCCAc0wggHJBgkrBgEFBQcwAQEEggG6MIIBtjCBn6IWBBStvZh6NLQm 9/rEJlTvA73gJMtUGhgPMjAxMjEwMTExMTM2NDdaMHQwcjBKMAkGBSsOAwIaBQAE FHyxZlScq9tE7mImFq30ZXv3etWUBBSuvZh6NLQm9/rEJlTvA73gJMtUGgIRAKcN bJWejX5BTb8DmevkCauAABgPMjAxMjEwMTExMTM2NDdaoBEYDzIwMTIxMDE1MTEz NjQ3WjANBgkqhkiG9w0BAQUFAAOCAQEAfnj3nh6z+USW6VlDWRytWpNmC1ZRwWlg P2+G4UF4HE8bMJkuiFLcZEVYTxlTYv+xAEpSFxdInFM2Q5C+O6pWOZ9NbikeR4oZ FTI1kAZ0Uw+YMpVM4ztvKBIpUSqlbi69iNJ9WGF6qzxVeqobSOyrjjwtTsuglUbR +mshp/SP7Br2IIK+KM1vgsmVExPfGPYANyk7ki/Q8uUnjqkreeSa9WC2iJLGcybW YavDhYWALebUGukNeedkloYhdjPboPPxDkKNjakwIG8EkbJK7uXewMOHHOFvFTX3 K388me8u5iQf4f3fj6ilEgs6f5Szzmb+vklPX0zIny/TVk2+Az7HmA== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WINH_D1.ors000066400000000000000000000037441274666402600237400ustar00rootroot00000000000000MIIFzwoBAKCCBcgwggXEBgkrBgEFBQcwAQEEggW1MIIFsTCBoKIWBBRf2uQDFpGg Ywh4P1y2H9bZ2/BQNBgPMjAxMjEwMTExMzI5NDJaMHUwczBLMAkGBSsOAwIaBQAE FKFyDqBqfGICVPKo9Z3Se6Tzty+kBBSwsEr9HHUo+BxhqhP2+sGQPWsWowISESG8 vx4IzALnkqQG05AvM+2bgAAYDzIwMTIxMDExMTAwMDAwWqARGA8yMDEyMTAxODEw MDAwMFowCwYJKoZIhvcNAQEFA4IBAQCX3gEX+JVfxuYmxBBxC9sNCi3o76ODIicr XMvm0DTO9VSyDBl7LDsMMgNMIDtO3flQSlBNZ2B9ikwyckXOSWXiXzybZVMdA/uq NchgkM9aChrlhG0AHZyYe/+dJSmEBFXkIomy+S6YQ7Mcs2s6WxCeWU7gB4XOy1zO /CvWjv0WQV1J2lZZ6pkvtECKAEjrVP275LA38HInFbYvVPXWzl4sDcX2TAxwUa4S xAJAfwl+B+oZSerZWGRo6KjZuB/OB31cB5n/lABmRez6Obi27D0UUCRv/eSbwOF4 Ofaa/XzJt7sF7WpVgoR41HI88W7aN4vtcw1zcVsBmfRMUNYZSqtfoIID+DCCA/Qw ggPwMIIC2KADAgECAhIRISdENsrz1CSWG3VIBwfQERQwDQYJKoZIhvcNAQEFBQAw WTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExLzAtBgNV BAMTJkdsb2JhbFNpZ24gRXh0ZW5kZWQgVmFsaWRhdGlvbiBDQSAtIEcyMB4XDTEy MDkxOTA3NDA1MFoXDTEyMTIxOTA4NDA1MFowgYUxCzAJBgNVBAYTAkJFMRkwFwYD VQQKExBHbG9iYWxTaWduIG52LXNhMUIwQAYDVQQDEzlHbG9iYWxTaWduIEV4dGVu ZGVkIFZhbGlkYXRpb24gQ0EgLSBHMiBPQ1NQIHJlc3BvbmRlciAtIDIxFzAVBgNV BAUTDjIwMTIwOTE5MDk0MDAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnCgMsBO+IxIqCnXCOfXJoIC3wj+f0s4DV9h2gJBzisWXkaJD2DfNrd0kHUXK qVVPUxnA4G5iZu0Z385/KiOt1/P6vQ/Z2/AsEh/8Z/hIyeZCHL31wrSZW4yLeZwi M76wPiBHJxPun681HQlVs/OGKSHnbHc1XJAIeA/M8u+lLWqIKB+AJ82TrOqUMj1s LjGhQNs84xPliONN5K7DrEy+Y65X/rFxN77Smw+UtcH1GgH2NgaHH8dpt1m25sgm UxZWhdx66opB/lbRQwWdGt7MC0kJFaWHDZq64DTuYoekFYSxAFu0nd0EekEHEJEi 9mquB9cv/96SuEJl8BcUWU/1LwIDAQABo4GEMIGBMAkGA1UdEwQCMAAwDgYDVR0P AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAw HQYDVR0OBBYEFF/a5AMWkaBjCHg/XLYf1tnb8FA0MB8GA1UdIwQYMBaAFLCwSv0c dSj4HGGqE/b6wZA9axajMA0GCSqGSIb3DQEBBQUAA4IBAQCKRl1iXFmOQtLseDWP Y5icDDBGiRi17CGgvIzGJi/ha0PhbO+X0TmQIEnRX3Mu0Er/Mm4RZSjMtJ2iZRh3 tGf4Dn+jKgKOmgXC3oOG/l8RPHLf0yaPSdn/z0TXtA30vTFBLlFeWnhbfhovea4+ snPdBxLqWZdtxmiwojgqA7YATCWwavizrBr09YRyDwzgtpZ2BwMruGuFuV9FsEwL PCM53yFlrM32oFghyfyE5kYjgnnueKM+pw1kA0jgb1CnVJRrMEN1TXuXDAZLtHKG 5X/drah1JtkoZhCzxzZ3bYdVDQJ90OHFqM58lwGD6z3XuPKrHDKZKt+CPIsl5g7p 4J2l certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WINH_D2.ors000066400000000000000000000037741274666402600237440ustar00rootroot00000000000000MIIF4AoBAKCCBdkwggXVBgkrBgEFBQcwAQEEggXGMIIFwjCBmaIWBBTqlwecTarB yVdbHxANRLCFYj1mqBgPMjAxMjEwMTExMzMwMTBaMG4wbDBEMAkGBSsOAwIaBQAE FLhXtbacB/gWIxOOkMkqDr4yAaoxBBRge2YaRQ2XyolQL30EzTSo//z9SwILBAAA AAABL07hRxCAABgPMjAxMjEwMDEwNjAwMDBaoBEYDzIwMTMwNDE1MDYwMDAwWjAL BgkqhkiG9w0BAQUDggEBAA0H7bvcULg1GayFtQVrYDyW0feOEMNGLmgaGuwRdrY3 KuWyNJLUUJKQZnOkdT8A4RpVX8xD4EgVyOqRACUahgdgp0g3QOn+vf2Zyf+NJIgW woF5qaJgCOeIOw5O6F4r1vUhp8NvqXHotswgG58Nzz6UMD+uyIgq5o8uzOjryEm6 wO2X+KvN9sMzkeZhNvAHkgBQL8CG4CggWnzn7At1DmhhsizfhDrosigM4Zr6Sm6z v1YfSPznD0b3TQ7RzvpbJPofF2aJXMIMxdKR5pemuevTDR2+JCXjVPsD/ZODFykc rsQeqx2vTOIg84PRKboXjCAwHn4rIN7JJtQqebLtD9egggQQMIIEDDCCBAgwggLw oAMCAQICCwQAAAAAAThXovYBMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRsw GQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwHhcNMTIwNzA1MTgwMDAwWhcNMTMw NzA1MTgwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu di1zYTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBPQ1NQIGZvciBSb290IFIxIC0gQnJh bmNoIDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDP2QF8p0+Fb7ID MwwD1gEr2oazjqbW28EZr3YEyMPk+7VFaGePSO1xjBGIE48Q7m7d6p6ZXCzlBZEi oudrHSr3WDqdIVKLDrZIDkgEgdjJE72Hq6Pf5CEGXyebbODm4sV96EfewSvOOYLL 866g3aoVhLDK02ny+Q5OsokW7nhnmGMMh10tZqR5VmdQTiw8MgeqUxBEaEO4WH2J ltgSsgNJBNBYuDgnn5ryzVqhvmCJvYZMYeN6qZFKy1MgHcR+wEpGLPlRL4ttu6e5 MJrVta7dVFobHUHoFog97LtQT1PY0Ubaihswjge5O04bYeCrgSSjr1e4xH/KDxRw yyhoscaFAgMBAAGjgdIwgc8wDgYDVR0PAQH/BAQDAgeAMB0GA1UdDgQWBBTqlwec TarByVdbHxANRLCFYj1mqDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBXzA0MDIGCCsG AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMB8GA1UdIwQYMBaAFGB7ZhpF DZfKiVAvfQTNNKj//P1LMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQAD ggEBAHiC6N1uF29d7CmiVapA8Nr1xLSVeIkBd4A8yHsUTQ7ATI7bwT14QUV4awe7 8cvmO5ZND8YG1ViwN162WFm9ivSoWBzvWDbU2JhQFb+XzrzCcdn0YbNiTxJh/vYm uDuxto00dpBgujSOAQv8B90iDEJ+sZpYRzDRj62qStRey0zpq5eX+pA+gdppMUFb 4QvJf0El8TbLCWLN4TjrFe6ju7ZaN9zmgVYGQ2fMHKIGNScLuIA950nYwzRkIfHa YW6HqP1rCR1EiYmstEeCQyDxJx+RUlh+q8L1BKzaMYhS6s63MZzQuGseYStaCmbC fBIRKjnK621vAWvc7UR+0hqnZ+U= certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WINH_D3.ors000066400000000000000000000045561274666402600237440ustar00rootroot00000000000000MIIG8AoBAKCCBukwggblBgkrBgEFBQcwAQEEggbWMIIG0jCB+aF+MHwxCzAJBgNV BAYTAkFVMQwwCgYDVQQIEwNOU1cxDzANBgNVBAcTBlN5ZG5leTEUMBIGA1UEChML Q0FjZXJ0IEluYy4xHjAcBgNVBAsTFVNlcnZlciBBZG1pbmlzdHJhdGlvbjEYMBYG A1UEAxMPb2NzcC5jYWNlcnQub3JnGA8yMDEyMTAxMTE0MzkxOFowZjBkMDwwCQYF Kw4DAhoFAAQUjKTJyxcpGUU+u45zCZG5JfKDImUEFBa1MhvUx/Pg5o7zvdKwOu6y ORjRAgMLs8aAABgPMjAxMjEwMTExNDIzMjVaoBEYDzIwMTIxMDEzMTQzOTE4WjAN BgkqhkiG9w0BAQUFAAOCAQEAgdrf+v+BwEhG0ghTLMVmuxWprJr/9VFtpKpxQrTo egSoW+5JOPCUAStfw3R3u7QM8sJf9bnPorgoCoY1hPKcWNLhvf1Ng3QlVkNa6NcO EonbuI4KE9Rhoflpf//pD/3AFKzU+ecRs04KtYezKrUvC1RayGabd7bgtIpdFss4 ZCZ22riqjFtqD3+2//AHg7VaqiJMKlRt05CMmGe+HKn5PEN9HaeI52nsTf+L1Jeh ItnaDPfV76vFHHXyUhR3iIgnqQDCig0q3yj7BQqH50+K+myiMAY+p8cuVqebno1i BzXxxpZl/fw1KnTFdEa7p2jtmXw3KZiHAWAddwg1F1tHTaCCBL4wggS6MIIEtjCC Ap6gAwIBAgIDCpvzMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0Ex HjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2Vy dCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNl cnQub3JnMB4XDTExMDgyMzAwMDI1NloXDTEzMDgyMjAwMDI1NlowfDELMAkGA1UE BhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYDVQQKEwtD QWNlcnQgSW5jLjEeMBwGA1UECxMVU2VydmVyIEFkbWluaXN0cmF0aW9uMRgwFgYD VQQDEw9vY3NwLmNhY2VydC5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCcxtRv5CPHw3BLdR/k/K72YsRgodbP+UdAONmvBvWzhwm6B8h6O+M64sFr 2w6be7SYBECIyOQgNJ1flK4MoAWhdBA/H5NtxaDOKbAqA27tO9GaevcPp7c518O0 3hVnlPLvsN1f48nY0jQOXUTfv5nYXmD0OSSK/V3IRo0KsWB6T9UnMGCeEwb4Oqqz uzM0b4SBflzMEony/m6Tg/qL7qs2TLZAqe77+BZaVdFkDUnaBN7RyMruXySxeXiz mogT3WhROeloMa/X+E01bWBYBEK7VZIY9pgBpXQ7vDbbIGgYuIXUi20wh03WMy16 VDYdV0IUXHpidNUeK9W/BPP/7APBAgMBAAGjRDBCMAwGA1UdEwEB/wQCMAAwJwYD VR0lBCAwHgYIKwYBBQUHAwIGCCsGAQUFBwMBBggrBgEFBQcDCTAJBgNVHREEAjAA MA0GCSqGSIb3DQEBBQUAA4ICAQAoT6p5f3cGprAcgrnzdenfTmDe9LCW7k2VnazA MAzpsD6gXcSlo4+3hoHem/SpKRH2tqi34DmImCiv/S6fxsKM4Gfn5rlkAFviuTvS r5Zrwh4ZKSfaoWv4bmbzmcAxvuxdMWHf/5PbjegjzFTbBMekVPZY/abYtD6kdHQZ VNgzwZVfTBfYhfa+Rg72I2zjKpMsjxMqWfTmUzW6wfK6LFudZqu0U1NnJw+IlnVU 6WtjL885ebQrmcRqWz3nMhVLIu5L3w/s+VTLvm7If6jcMDNUjz8s2BPcJeCXg3TE STsyl6tvk17RRz2+9JskxVOk11xIn96xR4FCERIid2ek9z1xi7oYOajQF50i/9Gj ReDEfRSyb4/LzoKDOY+h4Q6jryeHh7WIHFiK5qrBN2y8qOoRJ/OqQnqci/BJBNpe g9Q9PJRgGSzRndTXNHiYRbeLpq7eGo3sPqlR9qBQ3rd98XGOU0RCMnzjKhENC3qo 5PkSF2xs8RmjWktFSTDwjYo0qf1teo7CGHjgaPjQ7JE8Q4ysFOQndSWmLpqwDcI9 HfIvPwUIWArQrJRh9LCNSyvHVgLqY9kw8NW4TlMxV2WqaYCkiKi3XVRrSFR3ahS1 VBvRZ8KpplrV7rhXjVSSqqfLk1sX3l72Ck2F9ON+qbNFmvhgNjSiBY9neMgo804a wG/pag== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WINH_ND1.ors000066400000000000000000000011761274666402600240530ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBSIRFH/UCpp Xi2I9CG62QzyzsvqfBgPMjAxMjEwMTEwODQxMTNaMHMwcTBJMAkGBSsOAwIaBQAE FEm2DTgjjfhFbk7lhD6jlBEYApefBBSIRFH/UCppXi2I9CG62QzyzsvqfAIQIuEz IiCgSN8psr+aMcKbB4AAGA8yMDEyMTAxMTA4NDExM1qgERgPMjAxMjEwMTUwODQx MTNaMA0GCSqGSIb3DQEBBQUAA4IBAQCNnhlBMxxh9z5AKfzAxiKs90CfxUsqfYfk 8XlyF9VIfWRfEwzS6MF1pEzLnghRxTAmjrFgK+sxD9wk+S5Mdgw3nbED9DVFH2Hs RGKm/t9wkvrYOX6yRQqw6uRvU/5cibMjcyzKB/VQMwk4p4FwSUgBv88A5sTkKr2V eYdEm34hg2TZVkipPMBiyTyBLXs8D/9oALtnczg4xlTRSjDUvqoXL5haqY4QK2Pv mNwna6ACkwLmSuMe29UQ8IX2PUB4R5Etni5czyiKGxZLm+4NAhuEwWFNEzCyImPc 087gHGU1zx+qVSlajqMJ/9ZXYjbt7WiWdhOTGEv4VMn8dHhRUs32 certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WINH_ND2.ors000066400000000000000000000011761274666402600240540ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBQLWOWLxkwV N6RAqTCpIb5HNlpW/xgPMjAxMjEwMTAyMzAzMTlaMHMwcTBJMAkGBSsOAwIaBQAE FO2+ZAvtiWulchtVZmfKU1ZI9ewTBBQLWOWLxkwVN6RAqTCpIb5HNlpW/wIQEaO0 0OyNt3+doM1dLVEvQoAAGA8yMDEyMTAxMDIzMDMxOVqgERgPMjAxMjEwMTQyMzAz MTlaMA0GCSqGSIb3DQEBBQUAA4IBAQCHn2nGfEUX/EJruMkTgh7GgB0u9cpAepaD sPv9gtl3KLUZyR+NbGMIa5/bpoJp0yg1z5VL6CLMusy3AF6Cn2fyaioDxG+yc+gA PcPFdEqiIMr+TP8s7qcEiE6WZddSSCqCn90VZSCWkpDhnCjDRwJLBBPU3803fdMz oguvyr7y6Koxik8X/iUe8EpSzAvmm4GZL3veTI+x7IezJSrhCS9zM0ZHjySjoDxC +ljGH0EuWPTmFEqZVGIq3cuahIYzKItUbYnXU6ipi/2p42qbsFeok7eEN0EYsY1a vRATHGRmU7Q5HLCq4rQtZC1cis52Mvc9x1W4z/Gt5A3FtgElXXNA certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WINH_ND3.ors000066400000000000000000000012021274666402600240430ustar00rootroot00000000000000MIIB1AoBAKCCAc0wggHJBgkrBgEFBQcwAQEEggG6MIIBtjCBn6IWBBStvZh6NLQm 9/rEJlTvA73gJMtUGhgPMjAxMjEwMTExMTM2NDdaMHQwcjBKMAkGBSsOAwIaBQAE FH2xZlScq9tE7mImFq30ZXv3etWUBBStvZh6NLQm9/rEJlTvA73gJMtUGgIRAKcN bJWejX5BTb8DmevkCauAABgPMjAxMjEwMTExMTM2NDdaoBEYDzIwMTIxMDE1MTEz NjQ3WjANBgkqhkiG9w0BAQUFAAOCAQEAfnj3nh6z+USW6VlDWRytWpNmC1ZRwWlg P2+G4UF4HE8bMJkuiFLcZEVYTxlTYv+xAEpSFxdInFM2Q5C+O6pWOZ9NbikeR4oZ FTI1kAZ0Uw+YMpVM4ztvKBIpUSqlbi69iNJ9WGF6qzxVeqobSOyrjjwtTsuglUbR +mshp/SP7Br2IIK+KM1vgsmVExPfGPYANyk7ki/Q8uUnjqkreeSa9WC2iJLGcybW YavDhYWALebUGukNeedkloYhdjPboPPxDkKNjakwIG8EkbJK7uXewMOHHOFvFTX3 K388me8u5iQf4f3fj6ilEgs6f5Szzmb+vklPX0zIny/TVk2+Az7HmA== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKDOSC_D1.ors000066400000000000000000000037441274666402600241650ustar00rootroot00000000000000MIIFzwoBAKCCBcgwggXEBgkrBgEFBQcwAQEEggW1MIIFsTCBoKIWBBSpTXftIZX0 lLT9zwVSQC5Jfp3pqhgPMjAxMjEwMTAxNDU0NDNaMHUwczBLMAkGBSsOAwIaBQAE FKByDqBqfGICVPKo9Z3Se6Tzty+kBBSwsEr9HHUo+BxhqhP2+sGQPWsWowISESG8 vx4IzALnkqQG05AvM+2bgAAYDzIwMTIxMDEwMTMwMDAwWqARGA8yMDEyMTAxNzEz MDAwMFowCwYJKoZIhvcNAQEFA4IBAQBw5Z+0ggEddRTIq7cXlMoxG9Nrx4HtutsH itIUoZp/rlLoxHsJTo/VmdZvTTGIc7Ok9XuoH61lY/x9glAKsGRjz4Myc9+5rx0O 675lwmOS+uaf3/hRkicVrVr7Pt2ug3R7OXm2MJrohjNKP8lqtLJ0hHP88a8rotKA r9uz/qHm7K4Uh7dRt/Pnu9MPG74tZeFNN4M1ONMEiRdG39FqzFDXWxwQ3NmyC0Wo DQn+NklZMknr8mm7IBWpzgU1fTD9R0yv0zdhUZGiEXxvdhm7GJrTET5jS30Ksm5j o+n39YVu/vGbjyyYx3+WdeQLEyipaGvldSuJpT+R684/RuFWNetcoIID+DCCA/Qw ggPwMIIC2KADAgECAhIRIcYjwu4UNkR1VGrDbSdFei8wDQYJKoZIhvcNAQEFBQAw WTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExLzAtBgNV BAMTJkdsb2JhbFNpZ24gRXh0ZW5kZWQgVmFsaWRhdGlvbiBDQSAtIEcyMB4XDTEy MDkxOTA3NDAzMVoXDTEyMTIxOTA4NDAzMVowgYUxCzAJBgNVBAYTAkJFMRkwFwYD VQQKExBHbG9iYWxTaWduIG52LXNhMUIwQAYDVQQDEzlHbG9iYWxTaWduIEV4dGVu ZGVkIFZhbGlkYXRpb24gQ0EgLSBHMiBPQ1NQIHJlc3BvbmRlciAtIDExFzAVBgNV BAUTDjIwMTIwOTE5MDkzOTAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAx0kb6QhDH3sEDj4zaysjVzYelq9lZ1cso4R2IyQxaoPaG6GkaCmHA4sz6KP+ m3ADqplibEUBa/mzCxHW8/oy3NhGMFdbezduZrnRFLbzakOTeIo8VEIM3JPfgREv CX8nj6Xu7ERD6JO/ZQ9Xr7YVzKKN+3cVZlcMHoGBnOPcO2Sz0AcYyk5m5IsGBRoT T86j6Cr9PhOPTVwXL6Wxy1KVHsUZXUwnRacV0O4SHWQ4zM9Sablus9fTbh1CgIqW sKDyzVB4yECXkBVeUlA+cuCaRRVHRiR+jPDSgbU62nnNudEpGG7dyoop6IOvXv2O ydncWzaukxIVvQ/Ij85kHqs7HQIDAQABo4GEMIGBMAkGA1UdEwQCMAAwDgYDVR0P AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAw HQYDVR0OBBYEFKlNd+0hlfSUtP3PBVJALkl+nemqMB8GA1UdIwQYMBaAFLCwSv0c dSj4HGGqE/b6wZA9axajMA0GCSqGSIb3DQEBBQUAA4IBAQCe4rZg61Dmwygl/Uae BJZog64/FvuB1sfCqKLJTjKOfLcugSTX1TT7bLJbzXRGPQuorI3TIZEOwldIw01d DTLlsOCHrfHd+bpxgijxPkUuaA4NYnpvqTEMJqPKOC8QYfKupNjAPSuHvwqvqCfO RCe3jY6xQDO0WCTZ8/xMsOkw+J/YEYqALETf2Ug7k5eRL/TvfLd8Sgi7vPfmUeiW ptlsbhMOWQoQc+JA3vCI01rrjNq+0kIZ/r8nPGvablRr0Aakk6eDuS2dcReaPwuK 0xE136pJYiXdQ3SA7uwmlorjxmejavyoPCr23TU74DQEt6hhc6uIcabsa4Y8KvJy RI4G certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKDOSC_D2.ors000066400000000000000000000037741274666402600241710ustar00rootroot00000000000000MIIF4AoBAKCCBdkwggXVBgkrBgEFBQcwAQEEggXGMIIFwjCBmaIWBBTqlwecTarB yVdbHxANRLCFYj1mqBgPMjAxMjEwMTAxNDU0NDhaMG4wbDBEMAkGBSsOAwIaBQAE FLdXtbacB/gWIxOOkMkqDr4yAaoxBBRge2YaRQ2XyolQL30EzTSo//z9SwILBAAA AAABL07hRxCAABgPMjAxMjEwMDEwNjAwMDBaoBEYDzIwMTMwNDE1MDYwMDAwWjAL BgkqhkiG9w0BAQUDggEBACkGyoGefA2WuktIerofBoPgeyT8Mry57DxF7IEvX8dI Adk+MZRo5suYIE2AJty8bohYYiIxS7sZ5nsUM+iyu5cIdmsIwt/YifYsSdHc6DKz l3Yh4bS27QX05/Vuok3HmEMsRBmensKATMfvGP+TOwhuFeHWAK8KHSCmUbGZFP3A WKtrhRh/qC4qetMt07z/OKZcqHUYegEpO3xqRJ4MdqRJpV1urjdL/852US0mWAOL /EPoexWiHiKJmsNy7HAEKFQ+daqdZYM1BTGbS2aj3go/BVqf0xEhRLT0fsdof4Is 1Cy2ZHGbaVEyOQpXsxUEAqEdJcFRcLFGhdgnUjcQ9lqgggQQMIIEDDCCBAgwggLw oAMCAQICCwQAAAAAAThXovYBMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRsw GQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwHhcNMTIwNzA1MTgwMDAwWhcNMTMw NzA1MTgwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu di1zYTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBPQ1NQIGZvciBSb290IFIxIC0gQnJh bmNoIDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDQ2QF8p0+Fb7ID MwwD1gEr2oazjqbW28EZr3YEyMPk+7VFaGePSO1xjBGIE48Q7m7d6p6ZXCzlBZEi oudrHSr3WDqdIVKLDrZIDkgEgdjJE72Hq6Pf5CEGXyebbODm4sV96EfewSvOOYLL 866g3aoVhLDK02ny+Q5OsokW7nhnmGMMh10tZqR5VmdQTiw8MgeqUxBEaEO4WH2J ltgSsgNJBNBYuDgnn5ryzVqhvmCJvYZMYeN6qZFKy1MgHcR+wEpGLPlRL4ttu6e5 MJrVta7dVFobHUHoFog97LtQT1PY0Ubaihswjge5O04bYeCrgSSjr1e4xH/KDxRw yyhoscaFAgMBAAGjgdIwgc8wDgYDVR0PAQH/BAQDAgeAMB0GA1UdDgQWBBTqlwec TarByVdbHxANRLCFYj1mqDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBXzA0MDIGCCsG AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMB8GA1UdIwQYMBaAFGB7ZhpF DZfKiVAvfQTNNKj//P1LMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQAD ggEBAHiC6N1uF29d7CmiVapA8Nr1xLSVeIkBd4A8yHsUTQ7ATI7bwT14QUV4awe7 8cvmO5ZND8YG1ViwN162WFm9ivSoWBzvWDbU2JhQFb+XzrzCcdn0YbNiTxJh/vYm uDuxto00dpBgujSOAQv8B90iDEJ+sZpYRzDRj62qStRey0zpq5eX+pA+gdppMUFb 4QvJf0El8TbLCWLN4TjrFe6ju7ZaN9zmgVYGQ2fMHKIGNScLuIA950nYwzRkIfHa YW6HqP1rCR1EiYmstEeCQyDxJx+RUlh+q8L1BKzaMYhS6s63MZzQuGseYStaCmbC fBIRKjnK621vAWvc7UR+0hqnZ+U= certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKDOSC_D3.ors000066400000000000000000000045561274666402600241710ustar00rootroot00000000000000MIIG8AoBAKCCBukwggblBgkrBgEFBQcwAQEEggbWMIIG0jCB+aF+MHwxCzAJBgNV BAYTAkFVMQwwCgYDVQQIEwNOU1cxDzANBgNVBAcTBlN5ZG5leTEUMBIGA1UEChML Q0FjZXJ0IEluYy4xHjAcBgNVBAsTFVNlcnZlciBBZG1pbmlzdHJhdGlvbjEYMBYG A1UEAxMPb2NzcC5jYWNlcnQub3JnGA8yMDEyMTAxMDE1MTkzOVowZjBkMDwwCQYF Kw4DAhoFAAQUi6TJyxcpGUU+u45zCZG5JfKDImUEFBa1MhvUx/Pg5o7zvdKwOu6y ORjRAgMLs8aAABgPMjAxMjEwMTAxNDU2MTdaoBEYDzIwMTIxMDEyMTUxOTM5WjAN BgkqhkiG9w0BAQUFAAOCAQEAH1Bs3glJoAvCHhgVtN4F/avlKA1St74v7yuD1DIu cBf/4YRJdxZATXMI8I0TPjSl8L+rRAiUTVd8sPhWQ9XD9WaYKkTEjuQSPp851/81 zDihz9Kj5Rzo5PYpFsbSps/ALMQSRkrtuX4DCm9fbK7xC+adpbhQDnWW/GXM1+Ob lv3pHDQXLh2GQbRsaJBgLeSUxIIE7RWJv1N+Ugi5zF8rja5qnJ9DnkilEqMeXQp8 SThaI+TOe+KHK+7wTp5QkFNIE5l/uKgvSNIOwLe9HDevlSl1wYF6e+mAz3uoQyJa Ucx8FIoV6CIr+wUd+P8CmNXiQ7M59I8gm3FCDiEvWDQGEaCCBL4wggS6MIIEtjCC Ap6gAwIBAgIDCpvzMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0Ex HjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2Vy dCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNl cnQub3JnMB4XDTExMDgyMzAwMDI1NloXDTEzMDgyMjAwMDI1NlowfDELMAkGA1UE BhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYDVQQKEwtD QWNlcnQgSW5jLjEeMBwGA1UECxMVU2VydmVyIEFkbWluaXN0cmF0aW9uMRgwFgYD VQQDEw9vY3NwLmNhY2VydC5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCdxtRv5CPHw3BLdR/k/K72YsRgodbP+UdAONmvBvWzhwm6B8h6O+M64sFr 2w6be7SYBECIyOQgNJ1flK4MoAWhdBA/H5NtxaDOKbAqA27tO9GaevcPp7c518O0 3hVnlPLvsN1f48nY0jQOXUTfv5nYXmD0OSSK/V3IRo0KsWB6T9UnMGCeEwb4Oqqz uzM0b4SBflzMEony/m6Tg/qL7qs2TLZAqe77+BZaVdFkDUnaBN7RyMruXySxeXiz mogT3WhROeloMa/X+E01bWBYBEK7VZIY9pgBpXQ7vDbbIGgYuIXUi20wh03WMy16 VDYdV0IUXHpidNUeK9W/BPP/7APBAgMBAAGjRDBCMAwGA1UdEwEB/wQCMAAwJwYD VR0lBCAwHgYIKwYBBQUHAwIGCCsGAQUFBwMBBggrBgEFBQcDCTAJBgNVHREEAjAA MA0GCSqGSIb3DQEBBQUAA4ICAQAoT6p5f3cGprAcgrnzdenfTmDe9LCW7k2VnazA MAzpsD6gXcSlo4+3hoHem/SpKRH2tqi34DmImCiv/S6fxsKM4Gfn5rlkAFviuTvS r5Zrwh4ZKSfaoWv4bmbzmcAxvuxdMWHf/5PbjegjzFTbBMekVPZY/abYtD6kdHQZ VNgzwZVfTBfYhfa+Rg72I2zjKpMsjxMqWfTmUzW6wfK6LFudZqu0U1NnJw+IlnVU 6WtjL885ebQrmcRqWz3nMhVLIu5L3w/s+VTLvm7If6jcMDNUjz8s2BPcJeCXg3TE STsyl6tvk17RRz2+9JskxVOk11xIn96xR4FCERIid2ek9z1xi7oYOajQF50i/9Gj ReDEfRSyb4/LzoKDOY+h4Q6jryeHh7WIHFiK5qrBN2y8qOoRJ/OqQnqci/BJBNpe g9Q9PJRgGSzRndTXNHiYRbeLpq7eGo3sPqlR9qBQ3rd98XGOU0RCMnzjKhENC3qo 5PkSF2xs8RmjWktFSTDwjYo0qf1teo7CGHjgaPjQ7JE8Q4ysFOQndSWmLpqwDcI9 HfIvPwUIWArQrJRh9LCNSyvHVgLqY9kw8NW4TlMxV2WqaYCkiKi3XVRrSFR3ahS1 VBvRZ8KpplrV7rhXjVSSqqfLk1sX3l72Ck2F9ON+qbNFmvhgNjSiBY9neMgo804a wG/pag== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKIC_D1_Issuer_ICA.pem000066400000000000000000000031371274666402600257100ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIEhjCCA26gAwIBAgILBAAAAAABL07hXdQwDQYJKoZIhvcNAQEFBQAwTDEgMB4G A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTEwNDEzMTAwMDAwWhcNMjIwNDEz MTAwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1z YTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBFeHRlbmRlZCBWYWxpZGF0aW9uIENBIC0g RzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDOoUbMUpq4pbR/WNnN 2EugcgyXW6aIIMO5PUbc0FxSMPb6WU+FX7DbiLSpXysjSKyr9ZJ4FLYyD/tcaoVb AJDgu2X1WvlPZ37HbCnsk8ArysRe2LDb1r4/mwvAj6ldrvcAAqT8umYROHf+IyAl VRDFvYK5TLFoxuJwe4NcE2fBofN8C6iZmtDimyUxyCuNQPZSY7GgrVou9Xk2bTUs Dt0F5NDiB0i3KF4r1VjVbNAMoQFGAVqPxq9kx1UBXeHRxmxQJaAFrQCrDI1la93r wnJUyQ88ABeHIu/buYZ4FlGud9mmKE3zWI2DZ7k0JZscUYBR84OSaqOuR5rW5Isb wO2xAgMBAAGjggFaMIIBVjAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB /wIBADAdBgNVHQ4EFgQUsLBK/Rx1KPgcYaoT9vrBkD1rFqMwRwYDVR0gBEAwPjA8 BgRVHSAAMDQwMgYIKwYBBQUHAgEWJmh0dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29t L3JlcG9zaXRvcnkvMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwuZ2xvYmFs c2lnbi5uZXQvcm9vdC1yMi5jcmwwRAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzAB hihodHRwOi8vb2NzcC5nbG9iYWxzaWduLmNvbS9FeHRlbmRlZFNTTENBMCkGA1Ud JQQiMCAGCCsGAQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNwoDAzAfBgNVHSMEGDAW gBSb4gdXZxwewGoG3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAL0m28rZa pJWrnlrpK4KbzJBrfHRFIOde2Mcj7ig1sTVlKqVR4FU/9oNntOQ2KbDa7JeVqYoF o0X+Iy5SiLQfEICt0oufo1+oxetz3nmIQZgz7qdgGLFGyUAQB5yPClLJExoGbqCb LTr2rk/no1E1KlsYBRLlUdy2NmLz4aQP++TPw5S/EauhWTEB8MxT7I9j12yW00gq iiPtRVaoZkHqAblH7qFHDBTxI+Egc8p9UHxkOFejj0qcm+ltRc9Ea01gIEBxJbVG qmwIft/I+shWKpLLg7h5CZctXqEBzgbttJfJBNxB7+BPNk3kQHNG7BESfIhbNCYl TercGL7FG81kwA== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKIC_D2_Issuer_Root.pem000066400000000000000000000023551274666402600262410ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDbDuaZ jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp 1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE 38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKIC_D3_Issuer_Root.pem000066400000000000000000000050111274666402600262320ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIHPTCCBSWgAwIBAgIBADANBgkqhkiG9w0BAQQFADB5MRAwDgYDVQQKEwdSb290 IENBMR4wHAYDVQQLExVodHRwOi8vd3d3LmNhY2VydC5vcmcxIjAgBgNVBAMTGUNB IENlcnQgU2lnbmluZyBBdXRob3JpdHkxITAfBgkqhkiG9w0BCQEWEnN1cHBvcnRA Y2FjZXJ0Lm9yZzAeFw0wMzAzMzAxMjI5NDlaFw0zMzAzMjkxMjI5NDlaMHkxEDAO BgNVBAoTB1Jvb3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEi MCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJ ARYSc3VwcG9ydEBjYWNlcnQub3JnMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAzyLA4kZ97DYoB1CW8qAzQIxL8TtmPzHlawI229Z89vGIj053NgVBlfkJ 8BLPRoZzYLdufujAWGSuzbCtRRcMY/pnCujW0r8+55jE8Ez64AO7NV1sId6eINm6 zWYyN3L69wj1x81YyY7nDl7qPv4coRQKFWyGhFtkZip6qUtTefWIonvuLwphK42y fk1WpRPs6tqSnqxEQR5YYGUFZvjARL3LlPdCfgv3ZWiYUQXw8wWRBB0bF4LsyFe7 w2t6iPGwcswlWyCR7BYCEo8y6RcYSNDHBS4CMEK4JZwFaz+qOqfrU0j36NK2B5jc G8Y0f3/JHIJ6BVgrCFvzOKKrF11myZjXnhCLotLddJr3cQxyYN/Nb5gznZY0dj4k epKwDpUeb+agRThHqtdB7Uq3EvbXG4OKDy7YCbZZ16oE/9KTfWgu3YtLq1i6L43q laegw1SJpfvbi1EinbLDvhG+LJGGi5Z4rSDTii8aP8bQUWWHIbEZAWV/RRyH9XzQ QUxPKZgh/TMfdQwEUfoZd9vUFBzugcMd9Zi3aQaRIt0AUMyBMawSB3s42mhb5ivU fslfrejrckzzAeVLIL+aplfKkQABi6F1ITe1Yw1nPkZPcCBnzsXWWdsC4PDSy826 YreQQejdIOQpvGQpQsgi3Hia/0PsmBsJUUtaWsJx8cTLc6nloQsCAwEAAaOCAc4w ggHKMB0GA1UdDgQWBBQWtTIb1Mfz4OaO873SsDrusjkY0TCBowYDVR0jBIGbMIGY gBQWtTIb1Mfz4OaO873SsDrusjkY0aF9pHsweTEQMA4GA1UEChMHUm9vdCBDQTEe MBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0 IFNpZ25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2Vy dC5vcmeCAQAwDwYDVR0TAQH/BAUwAwEB/zAyBgNVHR8EKzApMCegJaAjhiFodHRw czovL3d3dy5jYWNlcnQub3JnL3Jldm9rZS5jcmwwMAYJYIZIAYb4QgEEBCMWIWh0 dHBzOi8vd3d3LmNhY2VydC5vcmcvcmV2b2tlLmNybDA0BglghkgBhvhCAQgEJxYl aHR0cDovL3d3dy5jYWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDBWBglghkgBhvhC AQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQg b3ZlciB0byBodHRwOi8vd3d3LmNhY2VydC5vcmcwDQYJKoZIhvcNAQEEBQADggIB ACjH7pyCArpcgBLKNQodgW+JapnM8mgPf6fhjViVPr3yBsOQWqy1YPaZQwGjiHCc nWKdpIevZ1gNMDY75q1I08t0AoZxPuIrA2jxNGJARjtT6ij0rPtmlVOKTV39O9lg 18p5aTuxZZKmxoGCXJzN600BiqXfEVWqFcofN8CCmHBh22p8lqOOLlQ+TyGpkO/c gr/c6EWtTZBzCDyUZbAEmXZ/4rzCahWqlwQ3JNgelE5tDlG+1sSPypZt90Pf6DBl Jzt7u0NDY8RD97LsaMzhGY4i+5jhe1o+ATc7iwiwovOVThrLm82asduycPAtStvY sONvRUgzEv/+PDIqVPfE94rwiCPCR/5kenHA0R6mY7AHfqQv0wGP3J8rtsYIqQ+T SCX8Ev2fQtzzxD72V7DX3WnRBnc0CkvSyqD/HMaMyRa+xMwyN2hzXwj7UfdJUzYF CpUCTPJ5GhD22Dp1nPMd8aINcGeGG7MW9S/lpOt5hvk9C8JzC6WZrG/8Z7jlLwum GCSNe9FINSkYQKyTYOGWhlC0elnYjyELn8+CkcY7v2vcB5G5l1YjqrZslMZIBjzk zk6q5PYvCdxTby78dOs6Y5nCpqyJvKeyRKANihDjbPIky/qbn3BHLt4Ui9SyIAmW omTxJBzcoTWcFbLUvFUufQb1nA5V9FrWk9p2rSVzTMVD -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKIC_ND1_Issuer_ICA.pem000066400000000000000000000034111274666402600260210ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIFBjCCA+6gAwIBAgIQEaO00OyNt3+doM1dLVEvQjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMDA1MjQwMDAw MDBaFw0yMDA1MzAxMDQ4MzhaMIGOMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDE0MDIGA1UEAxMrQ09NT0RPIEV4dGVuZGVkIFZhbGlkYXRp b24gU2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAM1KljPNJY1n7iiWN4dG8PYEooR/U6qW5h+xAhxu7X0h1Nc8HqLYaS+ot/Wi 7WRYZOFEZTZJQSABjTsT4gjzDPJXOZM3txyTRIOOvy3xoQV12m7ue28b6naDKHRK HCvT9cQDcpOvhs4JjDx11MkKL3Lzrb0OMDyEoXMfAyUUpY/D1vS15N2GevUZumjy hVSiMBHK0ZLLO3QGEqA3q2rYVBHfbJoWlLm0p2XGdC0x801S6VVRn8s+oo12mHDS b6ZlRS8bhbtbbfnywARmE4R6nc4n2PREnr+svpnba0/bWCGwiSe0jzLWS15ykV7f BZ3ZSS/0tm9QH3XLgJ3m0+TR8tMCAwEAAaOCAWkwggFlMB8GA1UdIwQYMBaAFAtY 5YvGTBU3pECpMKkhvkc2Wlb/MB0GA1UdDgQWBBSIRFH/UCppXi2I9CG62Qzyzsvq fDAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADA+BgNVHSAENzA1 MDMGBFUdIAAwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNv bS9DUFMwSQYDVR0fBEIwQDA+oDygOoY4aHR0cDovL2NybC5jb21vZG9jYS5jb20v Q09NT0RPQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdAYIKwYBBQUHAQEEaDBm MD4GCCsGAQUFBzAChjJodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9BZGRU cnVzdFNlcnZlckNBLmNydDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2Rv Y2EuY29tMA0GCSqGSIb3DQEBBQUAA4IBAQCaQ7+vpHJezX1vf/T8PYy7cOYe3QT9 P9ydn7+JdpvyhjH8f7PtKpFTLOKqsOPILHH3FYojHPFpLoH7sbxiC6saVBzZIl40 TKX2Iw9dej3bQ81pfhc3Us1TocIR1FN4J2TViUFNFlW7kMvw2OTd3dMJZEgo/zIj hC+Me1UvzymINzR4DzOq/7fylqSbRIC1vmxWVKukgZ4lGChUOn8sY89ZIIwYazgs tN3t40DeDDYlV5rA0WCeXgNol64aO+pF11GZSe5EWVYLXrGPaOqKnsrSyaADfnAl 9DLJTlCDh6I0SD1PNXf82Ijq9n0ezkO21cJqfjhmY03n7jLvDyToKmf6 -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKIC_ND2_Issuer_Root.pem000066400000000000000000000025471274666402600263620ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIID0DCCArigAwIBAgIQIKTEf93f4cdTYwcTiHdgEjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMTAxMDEwMDAw MDBaFw0zMDEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0UCLi3LjkRv3 UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI 2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp +2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O nKVIrLsm9wIDAQABo0IwQDAdBgNVHQ4EFgQUC1jli8ZMFTekQKkwqSG+RzZaVv8w DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD ggEBAC/JxBwHO89hAgCx2SFRdXIDMLDEFh9sAIsQrK/xR9SuEDwMGvjUk2ysEDd8 t6aDZK3N3w6HM503sMZ7OHKx8xoOo/lVem0DZgMXlUrxsXrfViEGQo+x06iF3u6X HWLrp+cxEmbDD6ZLLkGC9/3JG6gbr+48zuOcrigHoSybJMIPIyaDMouGDx8rEkYl Fo92kANr3ryqImhrjKGsKxE5pttwwn1y6TPn/CbxdFqR5p2ErPioBhlG5qfpqjQi pKGfeq23sqSaM4hxAjwu1nqyH6LKwN0vEJT9s4yEIHlG1QXUEOTS22RPuFvuG8Ug R1uUq27UlTMdphVx8fiUylQ5PsE= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WKIC_ND3_Issuer_Root.pem000066400000000000000000000027611274666402600263610ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290 MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALj3GjPm8gAELTngTlvt H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9 uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0 WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0 Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WRID_D1.ors000066400000000000000000000037441274666402600237400ustar00rootroot00000000000000MIIFzwoBAKCCBcgwggXEBgkrBgEFBQcwAQEEggW1MIIFsTCBoKIWBBRg2uQDFpGg Ywh4P1y2H9bZ2/BQNBgPMjAxMjEwMTExMTI1MjJaMHUwczBLMAkGBSsOAwIaBQAE FKByDqBqfGICVPKo9Z3Se6Tzty+kBBSwsEr9HHUo+BxhqhP2+sGQPWsWowISESG8 vx4IzALnkqQG05AvM+2bgAAYDzIwMTIxMDExMTAwMDAwWqARGA8yMDEyMTAxODEw MDAwMFowCwYJKoZIhvcNAQEFA4IBAQAHQBPHdHWNzaFs5bfBvQcvxBWsDnsCFXNs a1fECiWDFNt6Nz4MCBY4rC7n0nhQfvg4m1woNcTAZVO8lacYomwUU/5/XpeFM6yc NeFcVbfVXA48GWPANitNQCwyRL5hGfIqNy1I9T1BHlBqYusmJKy65r2iqpmld/hD 7S1dsCd4fXhjBQQORPmBqhKvWEU08Dh5aoaDAuaZoxRH8B1q+mUs0ODOIu34L84y JcxTKccd/HCwI8oxwLoBtyXSHb+dCzc7zSjFvQhbT5dOCvJNNe/fk6+EhMtQ6ybC D7p9EShCvU5jAdw54bZWk5wIQSvsWk9axUmYFFLYI3hAaoybpFVroIID+DCCA/Qw ggPwMIIC2KADAgECAhIRISdENsrz1CSWG3VIBwfQERQwDQYJKoZIhvcNAQEFBQAw WTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExLzAtBgNV BAMTJkdsb2JhbFNpZ24gRXh0ZW5kZWQgVmFsaWRhdGlvbiBDQSAtIEcyMB4XDTEy MDkxOTA3NDA1MFoXDTEyMTIxOTA4NDA1MFowgYUxCzAJBgNVBAYTAkJFMRkwFwYD VQQKExBHbG9iYWxTaWduIG52LXNhMUIwQAYDVQQDEzlHbG9iYWxTaWduIEV4dGVu ZGVkIFZhbGlkYXRpb24gQ0EgLSBHMiBPQ1NQIHJlc3BvbmRlciAtIDIxFzAVBgNV BAUTDjIwMTIwOTE5MDk0MDAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnCgMsBO+IxIqCnXCOfXJoIC3wj+f0s4DV9h2gJBzisWXkaJD2DfNrd0kHUXK qVVPUxnA4G5iZu0Z385/KiOt1/P6vQ/Z2/AsEh/8Z/hIyeZCHL31wrSZW4yLeZwi M76wPiBHJxPun681HQlVs/OGKSHnbHc1XJAIeA/M8u+lLWqIKB+AJ82TrOqUMj1s LjGhQNs84xPliONN5K7DrEy+Y65X/rFxN77Smw+UtcH1GgH2NgaHH8dpt1m25sgm UxZWhdx66opB/lbRQwWdGt7MC0kJFaWHDZq64DTuYoekFYSxAFu0nd0EekEHEJEi 9mquB9cv/96SuEJl8BcUWU/1LwIDAQABo4GEMIGBMAkGA1UdEwQCMAAwDgYDVR0P AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAw HQYDVR0OBBYEFF/a5AMWkaBjCHg/XLYf1tnb8FA0MB8GA1UdIwQYMBaAFLCwSv0c dSj4HGGqE/b6wZA9axajMA0GCSqGSIb3DQEBBQUAA4IBAQCKRl1iXFmOQtLseDWP Y5icDDBGiRi17CGgvIzGJi/ha0PhbO+X0TmQIEnRX3Mu0Er/Mm4RZSjMtJ2iZRh3 tGf4Dn+jKgKOmgXC3oOG/l8RPHLf0yaPSdn/z0TXtA30vTFBLlFeWnhbfhovea4+ snPdBxLqWZdtxmiwojgqA7YATCWwavizrBr09YRyDwzgtpZ2BwMruGuFuV9FsEwL PCM53yFlrM32oFghyfyE5kYjgnnueKM+pw1kA0jgb1CnVJRrMEN1TXuXDAZLtHKG 5X/drah1JtkoZhCzxzZ3bYdVDQJ90OHFqM58lwGD6z3XuPKrHDKZKt+CPIsl5g7p 4J2l certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WRID_D2.ors000066400000000000000000000037741274666402600237440ustar00rootroot00000000000000MIIF4AoBAKCCBdkwggXVBgkrBgEFBQcwAQEEggXGMIIFwjCBmaIWBBTrlwecTarB yVdbHxANRLCFYj1mqBgPMjAxMjEwMTExMTI1MjVaMG4wbDBEMAkGBSsOAwIaBQAE FLdXtbacB/gWIxOOkMkqDr4yAaoxBBRge2YaRQ2XyolQL30EzTSo//z9SwILBAAA AAABL07hRxCAABgPMjAxMjEwMDEwNjAwMDBaoBEYDzIwMTMwNDE1MDYwMDAwWjAL BgkqhkiG9w0BAQUDggEBAHThkPoy6eA7qX9y5C5b1ElRSwdjzsd15OJSqP2yjQbS Ol1K8DWtX0UhTfRH+CrIPoWL40g2HjXtIVeMD6s3hakYimZUenIJ/IRRSVWp+EXU MewgTVPz/wJN/9dJIkSbOI/BmpIGlaaBaLwcb39nJjZMq0sXj8jRI5i0isotOAFz Zc0R20viBEH099KuGktB2fKKEpVbbWPljTxKzkIBs9SXZBIqd/X2MWzQWcLKzhL0 oynkvqxTFqNVjjZKcKSXPS/XEUufLrv/E3xQZYAfTJr778kFkyA8JzrXiH6W5DX6 UbqsnO5DaPZvMDfvlQWETkoS1j+Qgu2mIWzdiw7sPrOgggQQMIIEDDCCBAgwggLw oAMCAQICCwQAAAAAAThXovYBMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAkJF MRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRsw GQYDVQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwHhcNMTIwNzA1MTgwMDAwWhcNMTMw NzA1MTgwMDAwWjBZMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu di1zYTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBPQ1NQIGZvciBSb290IFIxIC0gQnJh bmNoIDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDP2QF8p0+Fb7ID MwwD1gEr2oazjqbW28EZr3YEyMPk+7VFaGePSO1xjBGIE48Q7m7d6p6ZXCzlBZEi oudrHSr3WDqdIVKLDrZIDkgEgdjJE72Hq6Pf5CEGXyebbODm4sV96EfewSvOOYLL 866g3aoVhLDK02ny+Q5OsokW7nhnmGMMh10tZqR5VmdQTiw8MgeqUxBEaEO4WH2J ltgSsgNJBNBYuDgnn5ryzVqhvmCJvYZMYeN6qZFKy1MgHcR+wEpGLPlRL4ttu6e5 MJrVta7dVFobHUHoFog97LtQT1PY0Ubaihswjge5O04bYeCrgSSjr1e4xH/KDxRw yyhoscaFAgMBAAGjgdIwgc8wDgYDVR0PAQH/BAQDAgeAMB0GA1UdDgQWBBTqlwec TarByVdbHxANRLCFYj1mqDBMBgNVHSAERTBDMEEGCSsGAQQBoDIBXzA0MDIGCCsG AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMJMB8GA1UdIwQYMBaAFGB7ZhpF DZfKiVAvfQTNNKj//P1LMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQAD ggEBAHiC6N1uF29d7CmiVapA8Nr1xLSVeIkBd4A8yHsUTQ7ATI7bwT14QUV4awe7 8cvmO5ZND8YG1ViwN162WFm9ivSoWBzvWDbU2JhQFb+XzrzCcdn0YbNiTxJh/vYm uDuxto00dpBgujSOAQv8B90iDEJ+sZpYRzDRj62qStRey0zpq5eX+pA+gdppMUFb 4QvJf0El8TbLCWLN4TjrFe6ju7ZaN9zmgVYGQ2fMHKIGNScLuIA950nYwzRkIfHa YW6HqP1rCR1EiYmstEeCQyDxJx+RUlh+q8L1BKzaMYhS6s63MZzQuGseYStaCmbC fBIRKjnK621vAWvc7UR+0hqnZ+U= certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WRID_D3.ors000066400000000000000000000045561274666402600237440ustar00rootroot00000000000000MIIG8AoBAKCCBukwggblBgkrBgEFBQcwAQEEggbWMIIG0jCB+aF+MHwxCzAJBgNV BAYTAlVTMQwwCgYDVQQIEwNOU1cxDzANBgNVBAcTBlN5ZG5leTEUMBIGA1UEChML Q0FjZXJ0IEluYy4xHjAcBgNVBAsTFVNlcnZlciBBZG1pbmlzdHJhdGlvbjEYMBYG A1UEAxMPb2NzcC5jYWNlcnQub3JnGA8yMDEyMTAxMTEzMjE0MVowZjBkMDwwCQYF Kw4DAhoFAAQUi6TJyxcpGUU+u45zCZG5JfKDImUEFBa1MhvUx/Pg5o7zvdKwOu6y ORjRAgMLs8aAABgPMjAxMjEwMTExMjQyMTZaoBEYDzIwMTIxMDEzMTMyMTQxWjAN BgkqhkiG9w0BAQUFAAOCAQEAEWd9kKEfaurOXDV98OVtU27TmK4L4MeGEPdkg1i+ fbPMe1mouWlVm23W6yaM7mM2NMXLW+hTNzqfyMPM7rByXNaFAAniCPTXNO3eJRIA Zf0F10OSdBQ/ln4igHQCVZCnXR30/aP5/PMb4u3/LTuC9aW6K7mLXcuCvJztGnXO v3r64q/qTGG/b4eS65exykV9riSFuGp1rzLAy5fSYTBWTOBQ679PFjQnL60GkrZA Egtxw2ozEDwo+X0WamEouxN8mjX/VQlMdEbykUFDuPD3vZydZ04BV9f18RJZOU9j gCwMzd9gb4jUL4ykdWiLmO+YPDWFyNSYEIfnGgk1VvPHuaCCBL4wggS6MIIEtjCC Ap6gAwIBAgIDCpvzMA0GCSqGSIb3DQEBBQUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0Ex HjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2Vy dCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNl cnQub3JnMB4XDTExMDgyMzAwMDI1NloXDTEzMDgyMjAwMDI1NlowfDELMAkGA1UE BhMCQVUxDDAKBgNVBAgTA05TVzEPMA0GA1UEBxMGU3lkbmV5MRQwEgYDVQQKEwtD QWNlcnQgSW5jLjEeMBwGA1UECxMVU2VydmVyIEFkbWluaXN0cmF0aW9uMRgwFgYD VQQDEw9vY3NwLmNhY2VydC5vcmcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCcxtRv5CPHw3BLdR/k/K72YsRgodbP+UdAONmvBvWzhwm6B8h6O+M64sFr 2w6be7SYBECIyOQgNJ1flK4MoAWhdBA/H5NtxaDOKbAqA27tO9GaevcPp7c518O0 3hVnlPLvsN1f48nY0jQOXUTfv5nYXmD0OSSK/V3IRo0KsWB6T9UnMGCeEwb4Oqqz uzM0b4SBflzMEony/m6Tg/qL7qs2TLZAqe77+BZaVdFkDUnaBN7RyMruXySxeXiz mogT3WhROeloMa/X+E01bWBYBEK7VZIY9pgBpXQ7vDbbIGgYuIXUi20wh03WMy16 VDYdV0IUXHpidNUeK9W/BPP/7APBAgMBAAGjRDBCMAwGA1UdEwEB/wQCMAAwJwYD VR0lBCAwHgYIKwYBBQUHAwIGCCsGAQUFBwMBBggrBgEFBQcDCTAJBgNVHREEAjAA MA0GCSqGSIb3DQEBBQUAA4ICAQAoT6p5f3cGprAcgrnzdenfTmDe9LCW7k2VnazA MAzpsD6gXcSlo4+3hoHem/SpKRH2tqi34DmImCiv/S6fxsKM4Gfn5rlkAFviuTvS r5Zrwh4ZKSfaoWv4bmbzmcAxvuxdMWHf/5PbjegjzFTbBMekVPZY/abYtD6kdHQZ VNgzwZVfTBfYhfa+Rg72I2zjKpMsjxMqWfTmUzW6wfK6LFudZqu0U1NnJw+IlnVU 6WtjL885ebQrmcRqWz3nMhVLIu5L3w/s+VTLvm7If6jcMDNUjz8s2BPcJeCXg3TE STsyl6tvk17RRz2+9JskxVOk11xIn96xR4FCERIid2ek9z1xi7oYOajQF50i/9Gj ReDEfRSyb4/LzoKDOY+h4Q6jryeHh7WIHFiK5qrBN2y8qOoRJ/OqQnqci/BJBNpe g9Q9PJRgGSzRndTXNHiYRbeLpq7eGo3sPqlR9qBQ3rd98XGOU0RCMnzjKhENC3qo 5PkSF2xs8RmjWktFSTDwjYo0qf1teo7CGHjgaPjQ7JE8Q4ysFOQndSWmLpqwDcI9 HfIvPwUIWArQrJRh9LCNSyvHVgLqY9kw8NW4TlMxV2WqaYCkiKi3XVRrSFR3ahS1 VBvRZ8KpplrV7rhXjVSSqqfLk1sX3l72Ck2F9ON+qbNFmvhgNjSiBY9neMgo804a wG/pag== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WRID_ND1.ors000066400000000000000000000011761274666402600240530ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBSJRFH/UCpp Xi2I9CG62QzyzsvqfBgPMjAxMjEwMTEwODQxMTNaMHMwcTBJMAkGBSsOAwIaBQAE FEi2DTgjjfhFbk7lhD6jlBEYApefBBSIRFH/UCppXi2I9CG62QzyzsvqfAIQIuEz IiCgSN8psr+aMcKbB4AAGA8yMDEyMTAxMTA4NDExM1qgERgPMjAxMjEwMTUwODQx MTNaMA0GCSqGSIb3DQEBBQUAA4IBAQCNnhlBMxxh9z5AKfzAxiKs90CfxUsqfYfk 8XlyF9VIfWRfEwzS6MF1pEzLnghRxTAmjrFgK+sxD9wk+S5Mdgw3nbED9DVFH2Hs RGKm/t9wkvrYOX6yRQqw6uRvU/5cibMjcyzKB/VQMwk4p4FwSUgBv88A5sTkKr2V eYdEm34hg2TZVkipPMBiyTyBLXs8D/9oALtnczg4xlTRSjDUvqoXL5haqY4QK2Pv mNwna6ACkwLmSuMe29UQ8IX2PUB4R5Etni5czyiKGxZLm+4NAhuEwWFNEzCyImPc 087gHGU1zx+qVSlajqMJ/9ZXYjbt7WiWdhOTGEv4VMn8dHhRUs32 certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WRID_ND2.ors000066400000000000000000000011761274666402600240540ustar00rootroot00000000000000MIIB0woBAKCCAcwwggHIBgkrBgEFBQcwAQEEggG5MIIBtTCBnqIWBBQMWOWLxkwV N6RAqTCpIb5HNlpW/xgPMjAxMjEwMTAyMzAzMTlaMHMwcTBJMAkGBSsOAwIaBQAE FOy+ZAvtiWulchtVZmfKU1ZI9ewTBBQLWOWLxkwVN6RAqTCpIb5HNlpW/wIQEaO0 0OyNt3+doM1dLVEvQoAAGA8yMDEyMTAxMDIzMDMxOVqgERgPMjAxMjEwMTQyMzAz MTlaMA0GCSqGSIb3DQEBBQUAA4IBAQCHn2nGfEUX/EJruMkTgh7GgB0u9cpAepaD sPv9gtl3KLUZyR+NbGMIa5/bpoJp0yg1z5VL6CLMusy3AF6Cn2fyaioDxG+yc+gA PcPFdEqiIMr+TP8s7qcEiE6WZddSSCqCn90VZSCWkpDhnCjDRwJLBBPU3803fdMz oguvyr7y6Koxik8X/iUe8EpSzAvmm4GZL3veTI+x7IezJSrhCS9zM0ZHjySjoDxC +ljGH0EuWPTmFEqZVGIq3cuahIYzKItUbYnXU6ipi/2p42qbsFeok7eEN0EYsY1a vRATHGRmU7Q5HLCq4rQtZC1cis52Mvc9x1W4z/Gt5A3FtgElXXNA certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WRID_ND3.ors000066400000000000000000000012021274666402600240430ustar00rootroot00000000000000MIIB1AoBAKCCAc0wggHJBgkrBgEFBQcwAQEEggG6MIIBtjCBn6IWBBSuvZh6NLQm 9/rEJlTvA73gJMtUGhgPMjAxMjEwMTAxMzA3NDZaMHQwcjBKMAkGBSsOAwIaBQAE FHyxZlScq9tE7mImFq30ZXv3etWUBBStvZh6NLQm9/rEJlTvA73gJMtUGgIRAKcN bJWejX5BTb8DmevkCauAABgPMjAxMjEwMTAxMzA3NDZaoBEYDzIwMTIxMDE0MTMw NzQ2WjANBgkqhkiG9w0BAQUFAAOCAQEAA70+GYJoFuUBwIN9KHMqmOOtnmoLBBlm HL2Su70ZEqSmL4zTt3iHY3m2YaNYSPphgDlQ4lY8zGAkCSrZ3ulpJun3RRy+gD29 0ks155tChMbYNZrFm46vKWabBjh2p+623daymlcbgizi5Z+P4oJL68VrOqh+DArE MpHH16BTGaF+bAjzTRSbS90xUReqwnnEpRBrmcQVo4uKpSkbyrx7iMLqsJ2vGpgh xqj1kNPT9g3+gegmdU9QpFV0l9ZV8X/f0uz5nT4I0NL81d/KDHGx2rd+bftLODeL ZAWAzFbr5B5EMqPGoh/SQXpcuVOqMHjh8fi8PBXBcitlIFzdDKXDvA== certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WSNIC_D1_Issuer_ICA.pem000066400000000000000000000031371274666402600260360ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIEhjCCA26gAwIBAgILBAAAAAABL07hXdQwDQYJKoZIhvcNAQEFBQAwTDEgMB4G A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTEwNDEzMTAwMDAwWhcNMjIwNDEz MTAwMDAwWjBZMQswCQYDVQQGEwJVUzEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1z YTEvMC0GA1UEAxMmR2xvYmFsU2lnbiBFeHRlbmRlZCBWYWxpZGF0aW9uIENBIC0g RzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNoUbMUpq4pbR/WNnN 2EugcgyXW6aIIMO5PUbc0FxSMPb6WU+FX7DbiLSpXysjSKyr9ZJ4FLYyD/tcaoVb AJDgu2X1WvlPZ37HbCnsk8ArysRe2LDb1r4/mwvAj6ldrvcAAqT8umYROHf+IyAl VRDFvYK5TLFoxuJwe4NcE2fBofN8C6iZmtDimyUxyCuNQPZSY7GgrVou9Xk2bTUs Dt0F5NDiB0i3KF4r1VjVbNAMoQFGAVqPxq9kx1UBXeHRxmxQJaAFrQCrDI1la93r wnJUyQ88ABeHIu/buYZ4FlGud9mmKE3zWI2DZ7k0JZscUYBR84OSaqOuR5rW5Isb wO2xAgMBAAGjggFaMIIBVjAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB /wIBADAdBgNVHQ4EFgQUsLBK/Rx1KPgcYaoT9vrBkD1rFqMwRwYDVR0gBEAwPjA8 BgRVHSAAMDQwMgYIKwYBBQUHAgEWJmh0dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29t L3JlcG9zaXRvcnkvMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwuZ2xvYmFs c2lnbi5uZXQvcm9vdC1yMi5jcmwwRAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzAB hihodHRwOi8vb2NzcC5nbG9iYWxzaWduLmNvbS9FeHRlbmRlZFNTTENBMCkGA1Ud JQQiMCAGCCsGAQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNwoDAzAfBgNVHSMEGDAW gBSb4gdXZxwewGoG3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAL0m28rZa pJWrnlrpK4KbzJBrfHRFIOde2Mcj7ig1sTVlKqVR4FU/9oNntOQ2KbDa7JeVqYoF o0X+Iy5SiLQfEICt0oufo1+oxetz3nmIQZgz7qdgGLFGyUAQB5yPClLJExoGbqCb LTr2rk/no1E1KlsYBRLlUdy2NmLz4aQP++TPw5S/EauhWTEB8MxT7I9j12yW00gq iiPtRVaoZkHqAblH7qFHDBTxI+Egc8p9UHxkOFejj0qcm+ltRc9Ea01gIEBxJbVG qmwIft/I+shWKpLLg7h5CZctXqEBzgbttJfJBNxB7+BPNk3kQHNG7BESfIhbNCYl TercGL7FG81kwA== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WSNIC_D2_Issuer_Root.pem000066400000000000000000000023551274666402600263670ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG A1UEBhMCVVMxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAlVTMRkwFwYDVQQKExBHbG9i YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp 1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE 38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WSNIC_D3_Issuer_Root.pem000066400000000000000000000050111274666402600263600ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIHPTCCBSWgAwIBAgIBADANBgkqhkiG9w0BAQQFADB5MRAwDgYDVQQKEwdUZXN0 IENBMR4wHAYDVQQLExVodHRwOi8vd3d3LmNhY2VydC5vcmcxIjAgBgNVBAMTGUNB IENlcnQgU2lnbmluZyBBdXRob3JpdHkxITAfBgkqhkiG9w0BCQEWEnN1cHBvcnRA Y2FjZXJ0Lm9yZzAeFw0wMzAzMzAxMjI5NDlaFw0zMzAzMjkxMjI5NDlaMHkxEDAO BgNVBAoTB1Rlc3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEi MCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJ ARYSc3VwcG9ydEBjYWNlcnQub3JnMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAziLA4kZ97DYoB1CW8qAzQIxL8TtmPzHlawI229Z89vGIj053NgVBlfkJ 8BLPRoZzYLdufujAWGSuzbCtRRcMY/pnCujW0r8+55jE8Ez64AO7NV1sId6eINm6 zWYyN3L69wj1x81YyY7nDl7qPv4coRQKFWyGhFtkZip6qUtTefWIonvuLwphK42y fk1WpRPs6tqSnqxEQR5YYGUFZvjARL3LlPdCfgv3ZWiYUQXw8wWRBB0bF4LsyFe7 w2t6iPGwcswlWyCR7BYCEo8y6RcYSNDHBS4CMEK4JZwFaz+qOqfrU0j36NK2B5jc G8Y0f3/JHIJ6BVgrCFvzOKKrF11myZjXnhCLotLddJr3cQxyYN/Nb5gznZY0dj4k epKwDpUeb+agRThHqtdB7Uq3EvbXG4OKDy7YCbZZ16oE/9KTfWgu3YtLq1i6L43q laegw1SJpfvbi1EinbLDvhG+LJGGi5Z4rSDTii8aP8bQUWWHIbEZAWV/RRyH9XzQ QUxPKZgh/TMfdQwEUfoZd9vUFBzugcMd9Zi3aQaRIt0AUMyBMawSB3s42mhb5ivU fslfrejrckzzAeVLIL+aplfKkQABi6F1ITe1Yw1nPkZPcCBnzsXWWdsC4PDSy826 YreQQejdIOQpvGQpQsgi3Hia/0PsmBsJUUtaWsJx8cTLc6nloQsCAwEAAaOCAc4w ggHKMB0GA1UdDgQWBBQWtTIb1Mfz4OaO873SsDrusjkY0TCBowYDVR0jBIGbMIGY gBQWtTIb1Mfz4OaO873SsDrusjkY0aF9pHsweTEQMA4GA1UEChMHUm9vdCBDQTEe MBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0 IFNpZ25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2Vy dC5vcmeCAQAwDwYDVR0TAQH/BAUwAwEB/zAyBgNVHR8EKzApMCegJaAjhiFodHRw czovL3d3dy5jYWNlcnQub3JnL3Jldm9rZS5jcmwwMAYJYIZIAYb4QgEEBCMWIWh0 dHBzOi8vd3d3LmNhY2VydC5vcmcvcmV2b2tlLmNybDA0BglghkgBhvhCAQgEJxYl aHR0cDovL3d3dy5jYWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDBWBglghkgBhvhC AQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQg b3ZlciB0byBodHRwOi8vd3d3LmNhY2VydC5vcmcwDQYJKoZIhvcNAQEEBQADggIB ACjH7pyCArpcgBLKNQodgW+JapnM8mgPf6fhjViVPr3yBsOQWqy1YPaZQwGjiHCc nWKdpIevZ1gNMDY75q1I08t0AoZxPuIrA2jxNGJARjtT6ij0rPtmlVOKTV39O9lg 18p5aTuxZZKmxoGCXJzN600BiqXfEVWqFcofN8CCmHBh22p8lqOOLlQ+TyGpkO/c gr/c6EWtTZBzCDyUZbAEmXZ/4rzCahWqlwQ3JNgelE5tDlG+1sSPypZt90Pf6DBl Jzt7u0NDY8RD97LsaMzhGY4i+5jhe1o+ATc7iwiwovOVThrLm82asduycPAtStvY sONvRUgzEv/+PDIqVPfE94rwiCPCR/5kenHA0R6mY7AHfqQv0wGP3J8rtsYIqQ+T SCX8Ev2fQtzzxD72V7DX3WnRBnc0CkvSyqD/HMaMyRa+xMwyN2hzXwj7UfdJUzYF CpUCTPJ5GhD22Dp1nPMd8aINcGeGG7MW9S/lpOt5hvk9C8JzC6WZrG/8Z7jlLwum GCSNe9FINSkYQKyTYOGWhlC0elnYjyELn8+CkcY7v2vcB5G5l1YjqrZslMZIBjzk zk6q5PYvCdxTby78dOs6Y5nCpqyJvKeyRKANihDjbPIky/qbn3BHLt4Ui9SyIAmW omTxJBzcoTWcFbLUvFUufQb1nA5V9FrWk9p2rSVzTMVD -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WSNIC_ND1_Issuer_ICA.pem000066400000000000000000000034111274666402600261470ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIFBjCCA+6gAwIBAgIQEaO00OyNt3+doM1dLVEvQjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMDA1MjQwMDAw MDBaFw0yMDA1MzAxMDQ4MzhaMIGOMQswCQYDVQQGEwJVUzEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDE0MDIGA1UEAxMrQ09NT0RPIEV4dGVuZGVkIFZhbGlkYXRp b24gU2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAMxKljPNJY1n7iiWN4dG8PYEooR/U6qW5h+xAhxu7X0h1Nc8HqLYaS+ot/Wi 7WRYZOFEZTZJQSABjTsT4gjzDPJXOZM3txyTRIOOvy3xoQV12m7ue28b6naDKHRK HCvT9cQDcpOvhs4JjDx11MkKL3Lzrb0OMDyEoXMfAyUUpY/D1vS15N2GevUZumjy hVSiMBHK0ZLLO3QGEqA3q2rYVBHfbJoWlLm0p2XGdC0x801S6VVRn8s+oo12mHDS b6ZlRS8bhbtbbfnywARmE4R6nc4n2PREnr+svpnba0/bWCGwiSe0jzLWS15ykV7f BZ3ZSS/0tm9QH3XLgJ3m0+TR8tMCAwEAAaOCAWkwggFlMB8GA1UdIwQYMBaAFAtY 5YvGTBU3pECpMKkhvkc2Wlb/MB0GA1UdDgQWBBSIRFH/UCppXi2I9CG62Qzyzsvq fDAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADA+BgNVHSAENzA1 MDMGBFUdIAAwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNv bS9DUFMwSQYDVR0fBEIwQDA+oDygOoY4aHR0cDovL2NybC5jb21vZG9jYS5jb20v Q09NT0RPQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdAYIKwYBBQUHAQEEaDBm MD4GCCsGAQUFBzAChjJodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9BZGRU cnVzdFNlcnZlckNBLmNydDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2Rv Y2EuY29tMA0GCSqGSIb3DQEBBQUAA4IBAQCaQ7+vpHJezX1vf/T8PYy7cOYe3QT9 P9ydn7+JdpvyhjH8f7PtKpFTLOKqsOPILHH3FYojHPFpLoH7sbxiC6saVBzZIl40 TKX2Iw9dej3bQ81pfhc3Us1TocIR1FN4J2TViUFNFlW7kMvw2OTd3dMJZEgo/zIj hC+Me1UvzymINzR4DzOq/7fylqSbRIC1vmxWVKukgZ4lGChUOn8sY89ZIIwYazgs tN3t40DeDDYlV5rA0WCeXgNol64aO+pF11GZSe5EWVYLXrGPaOqKnsrSyaADfnAl 9DLJTlCDh6I0SD1PNXf82Ijq9n0ezkO21cJqfjhmY03n7jLvDyToKmf6 -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WSNIC_ND2_Issuer_Root.pem000066400000000000000000000025471274666402600265100ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIID0DCCArigAwIBAgIQIKTEf93f4cdTYwcTiHdgEjANBgkqhkiG9w0BAQUFADCB gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMTAxMDEwMDAw MDBaFw0zMDEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJVUzEbMBkGA1UECBMSR3Jl YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI 2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp +2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O nKVIrLsm9wIDAQABo0IwQDAdBgNVHQ4EFgQUC1jli8ZMFTekQKkwqSG+RzZaVv8w DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD ggEBAC/JxBwHO89hAgCx2SFRdXIDMLDEFh9sAIsQrK/xR9SuEDwMGvjUk2ysEDd8 t6aDZK3N3w6HM503sMZ7OHKx8xoOo/lVem0DZgMXlUrxsXrfViEGQo+x06iF3u6X HWLrp+cxEmbDD6ZLLkGC9/3JG6gbr+48zuOcrigHoSybJMIPIyaDMouGDx8rEkYl Fo92kANr3ryqImhrjKGsKxE5pttwwn1y6TPn/CbxdFqR5p2ErPioBhlG5qfpqjQi pKGfeq23sqSaM4hxAjwu1nqyH6LKwN0vEJT9s4yEIHlG1QXUEOTS22RPuFvuG8Ug R1uUq27UlTMdphVx8fiUylQ5PsE= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/WSNIC_ND3_Issuer_Root.pem000066400000000000000000000027611274666402600265070ustar00rootroot00000000000000-----BEGIN CERTIFICATE----- MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290 MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCVVMx FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9 uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0 WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0 Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ= -----END CERTIFICATE----- certvalidator-0.11.1/tests/fixtures/openssl-ocsp/readme.md000066400000000000000000000001451274666402600236710ustar00rootroot00000000000000OCSP certificates and responses from https://github.com/openssl/openssl/tree/master/test/ocsp-tests. certvalidator-0.11.1/tests/fixtures/revoked.grc.com.crt000066400000000000000000000023621274666402600231700ustar00rootroot000000000000000‚î0‚Ö !Uh8uÚ4Åß—C>Óö§0  *†H†÷ 0W1 0 UBE10U GlobalSign nv-sa1-0+U$GlobalSign Domain Validation CA - G20 140423153752Z 170423153752Z0J1 0 UUS1!0U Domain Control Validated10Urevoked.grc.com0‚"0  *†H†÷ ‚0‚ ‚Þš/¹3•ѳÑÿ{í®±îê[\ɶo¿qüü±%Å*ú«f 4xŒ˜çñ§PT[rŽáòFŒË„E1$Ú8`æ.55¸= Ö¤º¬¥Ââì0Ðk²)Ni3§¢C$#‰[ê¢9 Ÿ6’1*Ôºûô0®e•&!1½càsPñ2½dyëðNOÅ!ay:4?ÄBÔñ^^œHJˆè"–€Æ°­nñ’V¶ãÐnŸlâ23(0ŽԻɼ8•>œR[’=—°Ø³ËD‚^kÉØŒiuŒF›r<‚u€pì°Ž‚¿w ¿ÀÔÚà2³5Ý¥—gd¹ƒ£‚¿0‚»0Uÿ 0IU B0@0>g 0402+&https://www.globalsign.com/repository/0(U!0‚revoked.grc.com‚ mail.grc.com0 U00U%0++0?U80604 2 0†.http://crl.globalsign.com/gs/gsdomainvalg2.crl0ˆ+|0z0A+0†5http://secure.globalsign.com/cacert/gsdomainvalg2.crt05+0†)http://ocsp2.globalsign.com/gsdomainvalg20Ur<˜îX1çTï·Tž‚°F’R_0U#0€–­ú°[¹ƒd*vŠiÚBÜþý(0  *†H†÷ ‚’'ù'ž¹n›·§•ù€- Yøz@ìl ŠoGo¨ìhÆ¥Q„èƒÀ~›ÕëÌ^" @'Ƈ·=‰_HŠ…ÐÚ•®Âl­]~®ÄÂíôoi¢\dÐÎtÁƒÄ¿À¤PT?æÝ2Rè†!¦SQ.­ãsrÍPËW/}Im¦˜åZqÈö½íóò»IÕ9jµ!ZzÎô^ÄoÇo´‘kæKúžž º8J|#S¡6»à³¢ ¾C¡æO,¼*Q•”WG¦ò4½Äö.€P<âOÏrËÅÊÙRÉòÉ©Š+Oc¤ý™O ƒ}ÿößÉYþcertvalidator-0.11.1/tests/test_certificate_validator.py000066400000000000000000000067701274666402600235660ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function from datetime import datetime import unittest import os from asn1crypto import pem, x509 from asn1crypto.util import timezone from certvalidator import CertificateValidator, ValidationContext from certvalidator.errors import PathValidationError from ._unittest_compat import patch patch() tests_root = os.path.dirname(__file__) fixtures_dir = os.path.join(tests_root, 'fixtures') class CertificateValidatorTests(unittest.TestCase): def _load_nist_cert(self, filename): return self._load_cert_object('nist_pkits', 'certs', filename) def _load_cert_object(self, *path_components): with open(os.path.join(fixtures_dir, *path_components), 'rb') as f: cert_bytes = f.read() if pem.detect(cert_bytes): _, _, cert_bytes = pem.unarmor(cert_bytes) cert = x509.Certificate.load(cert_bytes) return cert def test_basic_certificate_validator_tls(self): cert = self._load_cert_object('codex.crt') other_certs = [self._load_cert_object('GeoTrust_EV_SSL_CA_-_G4.crt')] moment = datetime(2015, 1, 1, 0, 0, 0, tzinfo=timezone.utc) context = ValidationContext(moment=moment) validator = CertificateValidator(cert, other_certs, context) path = validator.validate_tls('codexns.io') self.assertEqual(3, len(path)) def test_basic_certificate_validator_tls_expired(self): cert = self._load_cert_object('codex.crt') other_certs = [self._load_cert_object('GeoTrust_EV_SSL_CA_-_G4.crt')] validator = CertificateValidator(cert, other_certs) with self.assertRaisesRegexp(PathValidationError, 'expired'): validator.validate_tls('codexns.io') def test_basic_certificate_validator_tls_invalid_hostname(self): cert = self._load_cert_object('codex.crt') other_certs = [self._load_cert_object('GeoTrust_EV_SSL_CA_-_G4.crt')] moment = datetime(2015, 1, 1, 0, 0, 0, tzinfo=timezone.utc) context = ValidationContext(moment=moment) validator = CertificateValidator(cert, other_certs, context) with self.assertRaisesRegexp(PathValidationError, 'not valid'): validator.validate_tls('google.com') def test_basic_certificate_validator_tls_invalid_key_usage(self): cert = self._load_cert_object('codex.crt') other_certs = [self._load_cert_object('GeoTrust_EV_SSL_CA_-_G4.crt')] moment = datetime(2015, 1, 1, 0, 0, 0, tzinfo=timezone.utc) context = ValidationContext(moment=moment) validator = CertificateValidator(cert, other_certs, context) with self.assertRaisesRegexp(PathValidationError, 'for the purpose'): validator.validate_usage(set(['crl_sign'])) def test_basic_certificate_validator_tls_whitelist(self): cert = self._load_cert_object('codex.crt') other_certs = [self._load_cert_object('GeoTrust_EV_SSL_CA_-_G4.crt')] context = ValidationContext(whitelisted_certs=[cert.sha1_fingerprint]) validator = CertificateValidator(cert, other_certs, context) # If whitelist does not work, this will raise exception for expiration validator.validate_tls('codexns.io') # If whitelist does not work, this will raise exception for hostname validator.validate_tls('google.com') # If whitelist does not work, this will raise exception for key usage validator.validate_usage(set(['crl_sign'])) certvalidator-0.11.1/tests/test_crl_client.py000066400000000000000000000017471274666402600213540ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import unittest import os from asn1crypto import x509, pem from certvalidator import crl_client from certvalidator.context import ValidationContext from certvalidator.validate import verify_crl tests_root = os.path.dirname(__file__) fixtures_dir = os.path.join(tests_root, 'fixtures') class CRLClientTests(unittest.TestCase): def test_fetch_crl(self): with open(os.path.join(fixtures_dir, 'GeoTrust_EV_SSL_CA_-_G4.crt'), 'rb') as f: file_bytes = f.read() if pem.detect(file_bytes): _, _, file_bytes = pem.unarmor(file_bytes) intermediate = x509.Certificate.load(file_bytes) crls = crl_client.fetch(intermediate, timeout=3) context = ValidationContext(crls=crls) registry = context.certificate_registry path = registry.build_paths(intermediate)[0] verify_crl(intermediate, path, context) certvalidator-0.11.1/tests/test_ocsp_client.py000066400000000000000000000021741274666402600215330ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import unittest import os from asn1crypto import pem, x509 from certvalidator import ocsp_client from certvalidator.registry import CertificateRegistry from certvalidator.context import ValidationContext from certvalidator.validate import verify_ocsp_response tests_root = os.path.dirname(__file__) fixtures_dir = os.path.join(tests_root, 'fixtures') class OCSPClientTests(unittest.TestCase): def test_fetch_ocsp(self): with open(os.path.join(fixtures_dir, 'GeoTrust_EV_SSL_CA_-_G4.crt'), 'rb') as f: cert_bytes = f.read() if pem.detect(cert_bytes): _, _, cert_bytes = pem.unarmor(cert_bytes) intermediate = x509.Certificate.load(cert_bytes) registry = CertificateRegistry() path = registry.build_paths(intermediate)[0] issuer = path.find_issuer(intermediate) ocsp_response = ocsp_client.fetch(intermediate, issuer, timeout=3) context = ValidationContext(ocsps=[ocsp_response]) verify_ocsp_response(intermediate, path, context) certvalidator-0.11.1/tests/test_registry.py000066400000000000000000000042711274666402600211010ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function import unittest import os from asn1crypto import pem, x509 from certvalidator.registry import CertificateRegistry tests_root = os.path.dirname(__file__) fixtures_dir = os.path.join(tests_root, 'fixtures') class RegistryTests(unittest.TestCase): def test_build_paths(self): with open(os.path.join(fixtures_dir, 'codex.crt'), 'rb') as f: cert_bytes = f.read() if pem.detect(cert_bytes): _, _, cert_bytes = pem.unarmor(cert_bytes) cert = x509.Certificate.load(cert_bytes) with open(os.path.join(fixtures_dir, 'GeoTrust_EV_SSL_CA_-_G4.crt'), 'rb') as f: other_certs = [f.read()] repo = CertificateRegistry(other_certs=other_certs) paths = repo.build_paths(cert) self.assertEqual(1, len(paths)) path = paths[0] self.assertEqual(3, len(path)) self.assertEqual( [ b'z\x10xI\xe1u\x1a@\x0e\r\xdb\xac0\xc8\xaaK\x12u\xd1\xac', b'\xaa+\x03\x14\xafd.\x13\x0e\xd6\x92%\xe3\xff*\xba\xd7=b0', b"\xfcq\x7f\x98='\xcc\xb3D\xfbK\x85\xf0\x81\x8f\xab\xcb\xf0\x9b\x14" ], [item.subject.sha1 for item in path] ) def test_build_paths_custom_ca_certs(self): with open(os.path.join(fixtures_dir, 'codex.crt'), 'rb') as f: cert_bytes = f.read() if pem.detect(cert_bytes): _, _, cert_bytes = pem.unarmor(cert_bytes) cert = x509.Certificate.load(cert_bytes) with open(os.path.join(fixtures_dir, 'GeoTrust_EV_SSL_CA_-_G4.crt'), 'rb') as f: other_certs = [f.read()] repo = CertificateRegistry(trust_roots=other_certs) paths = repo.build_paths(cert) self.assertEqual(1, len(paths)) path = paths[0] self.assertEqual(2, len(path)) self.assertEqual( [ b'\xaa+\x03\x14\xafd.\x13\x0e\xd6\x92%\xe3\xff*\xba\xd7=b0', b"\xfcq\x7f\x98='\xcc\xb3D\xfbK\x85\xf0\x81\x8f\xab\xcb\xf0\x9b\x14" ], [item.subject.sha1 for item in path] ) certvalidator-0.11.1/tests/test_validate.py000066400000000000000000003715301274666402600210270ustar00rootroot00000000000000# coding: utf-8 from __future__ import unicode_literals, division, absolute_import, print_function from datetime import datetime import base64 import unittest import os import sys from asn1crypto import crl, ocsp, pem, x509 from asn1crypto.util import timezone from certvalidator import crl_client, ocsp_client from certvalidator.context import ValidationContext from certvalidator.path import ValidationPath from certvalidator.validate import validate_path from certvalidator.errors import PathValidationError, RevokedError from ._unittest_compat import patch from .unittest_data import data_decorator, data if sys.version_info < (3,): from urllib2 import URLError else: from urllib.error import URLError patch() tests_root = os.path.dirname(__file__) fixtures_dir = os.path.join(tests_root, 'fixtures') @data_decorator class ValidateTests(unittest.TestCase): def _load_nist_cert(self, filename): return self._load_cert_object('nist_pkits', 'certs', filename) def _load_nist_crl(self, filename): with open(os.path.join(fixtures_dir, 'nist_pkits', 'crls', filename), 'rb') as f: return crl.CertificateList.load(f.read()) def _load_openssl_ors(self, filename): with open(os.path.join(fixtures_dir, 'openssl-ocsp', filename), 'rb') as f: return ocsp.OCSPResponse.load(base64.b64decode(f.read())) def _load_cert_object(self, *path_components): with open(os.path.join(fixtures_dir, *path_components), 'rb') as f: cert_bytes = f.read() if pem.detect(cert_bytes): _, _, cert_bytes = pem.unarmor(cert_bytes) cert = x509.Certificate.load(cert_bytes) return cert def test_revocation_mode_soft(self): cert = self._load_cert_object('revoked.grc.com.crt') ca_certs = [self._load_cert_object('globalsign_root.crt')] other_certs = [ self._load_cert_object('globalsign_dv_g2.crt'), ] try: # Mock the crl and ocsp clients to fail orig_crl_fetch = crl_client.fetch orig_ocsp_fetch = ocsp_client.fetch def crl_fetch(cert, use_deltas=True, user_agent=None, timeout=10): raise URLError('Connection timed out') crl_client.fetch = crl_fetch def ocsp_fetch(cert, issuer, hash_algo='sha1', nonce=True, user_agent=None, timeout=10): raise URLError('Connection timed out') ocsp_client.fetch = ocsp_fetch context = ValidationContext( trust_roots=ca_certs, other_certs=other_certs, allow_fetching=True ) paths = context.certificate_registry.build_paths(cert) self.assertEqual(1, len(paths)) path = paths[0] self.assertEqual(3, len(path)) validate_path(context, path) finally: crl_client.fetch = orig_crl_fetch ocsp_client.fetch = orig_ocsp_fetch def test_revocation_mode_hard(self): cert = self._load_cert_object('revoked.grc.com.crt') ca_certs = [self._load_cert_object('globalsign_root.crt')] other_certs = [ self._load_cert_object('globalsign_dv_g2.crt'), ] context = ValidationContext( trust_roots=ca_certs, other_certs=other_certs, allow_fetching=True, crl_fetch_params={'timeout': 30}, ocsp_fetch_params={'timeout': 30}, revocation_mode='hard-fail' ) paths = context.certificate_registry.build_paths(cert) self.assertEqual(1, len(paths)) path = paths[0] self.assertEqual(3, len(path)) expected = ( '(CRL|OCSP response) indicates the end-entity certificate was ' 'revoked at 15:44:10 on 2014-04-23, due to an unspecified reason' ) with self.assertRaisesRegexp(RevokedError, expected): validate_path(context, path) @data('ocsp_info', True) def openssl_ocsp(self, ca_file, other_files, cert_file, ocsp_files, path_len, moment, excp_class, excp_msg): ca_certs = [self._load_cert_object('openssl-ocsp', ca_file)] other_certs = [self._load_cert_object('openssl-ocsp', filename) for filename in other_files] cert = self._load_cert_object('openssl-ocsp', cert_file) ocsp_responses = [self._load_openssl_ors(filename) for filename in ocsp_files] context = ValidationContext( trust_roots=ca_certs, other_certs=other_certs, moment=moment, ocsps=ocsp_responses ) paths = context.certificate_registry.build_paths(cert) self.assertEqual(1, len(paths)) path = paths[0] self.assertEqual(path_len, len(path)) if excp_class: with self.assertRaisesRegexp(excp_class, excp_msg): validate_path(context, path) else: validate_path(context, path) @staticmethod def ocsp_info(): return ( ( 'direct_with_intermediate_success', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'ND1.ors', 'ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), None, None, ), ( 'direct_success', 'ND3_Issuer_Root.pem', [], 'ND3_Cert_EE.pem', [ 'ND3.ors', ], 2, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), None, None, ), ( 'delegated_with_intermediate_success', 'R2.pem', [ 'D1_Issuer_ICA.pem', ], 'D1_Cert_EE.pem', [ 'D1.ors', ], 3, datetime(2012, 10, 23, 11, 0, 0, tzinfo=timezone.utc), None, None, ), ( 'delegated_success', 'D3_Issuer_Root.pem', [], 'D3_Cert_EE.pem', [ 'D3.ors', ], 2, datetime(2012, 10, 23, 11, 0, 0, tzinfo=timezone.utc), None, None, ), ( 'direct_with_intermediate_invalid_response_signature_ee', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'ISOP_ND1.ors', 'ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response signature' ), ), ( 'direct_with_intermediate_invalid_response_signature_intermediate', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'ND1.ors', 'ISOP_ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the intermediate ' 'certificate 1 revocation checks failed: Unable to verify ' 'OCSP response signature' ), ), ( 'direct_invalid_response_signature', 'ND3_Issuer_Root.pem', [], 'ND3_Cert_EE.pem', [ 'ISOP_ND3.ors', ], 2, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response signature' ), ), ( 'delegated_with_intermediate_invalid_response_signature', 'R2.pem', [ 'D1_Issuer_ICA.pem', ], 'D1_Cert_EE.pem', [ 'ISOP_D1.ors', ], 3, datetime(2012, 10, 10, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response signature' ), ), ( 'delegated_invalid_response_signature', 'D3_Issuer_Root.pem', [], 'D3_Cert_EE.pem', [ 'ISOP_D3.ors', ], 2, datetime(2012, 10, 10, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response signature' ), ), ( 'direct_with_intermediate_invalid_wrong_responder_id_ee', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'WRID_ND1.ors', 'ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be located' ), ), ( 'direct_with_intermediate_invalid_wrong_responder_id_intermediate', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'ND1.ors', 'WRID_ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the intermediate ' 'certificate 1 revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be located' ), ), ( 'direct_invalid_wrong_responder_id', 'ND3_Issuer_Root.pem', [], 'ND3_Cert_EE.pem', [ 'WRID_ND3.ors', ], 2, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be located' ), ), ( 'delegated_with_intermediate_invalid_wrong_responder_id', 'R2.pem', [ 'D1_Issuer_ICA.pem', ], 'D1_Cert_EE.pem', [ 'WRID_D1.ors', ], 3, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be located' ), ), ( 'delegated_invalid_wrong_responder_id', 'D3_Issuer_Root.pem', [], 'D3_Cert_EE.pem', [ 'WRID_D3.ors', ], 2, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be located' ), ), ( 'direct_with_intermediate_invalid_wrong_issuer_name_hash_ee', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'WINH_ND1.ors', 'ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer name hash does not match' ), ), ( 'direct_with_intermediate_invalid_wrong_issuer_name_hash_intermediate', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'ND1.ors', 'WINH_ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the intermediate ' 'certificate 1 revocation checks failed: OCSP response ' 'issuer name hash does not match' ), ), ( 'direct_invalid_wrong_issuer_name_hash', 'ND3_Issuer_Root.pem', [], 'ND3_Cert_EE.pem', [ 'WINH_ND3.ors', ], 2, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer name hash does not match' ), ), ( 'delegated_with_intermediate_invalid_wrong_issuer_name_hash', 'R2.pem', [ 'D1_Issuer_ICA.pem', ], 'D1_Cert_EE.pem', [ 'WINH_D1.ors', ], 3, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer name hash does not match' ), ), ( 'delegated_invalid_wrong_issuer_name_hash', 'D3_Issuer_Root.pem', [], 'D3_Cert_EE.pem', [ 'WINH_D3.ors', ], 2, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer name hash does not match' ), ), ( 'direct_with_intermediate_invalid_wrong_issuer_key_hash_ee', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'WIKH_ND1.ors', 'ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer key hash does not match' ), ), ( 'direct_with_intermediate_invalid_wrong_issuer_key_hash_intermediate', 'ND2_Issuer_Root.pem', [ 'ND1_Issuer_ICA.pem', ], 'ND1_Cert_EE.pem', [ 'ND1.ors', 'WIKH_ND2.ors', ], 3, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the intermediate ' 'certificate 1 revocation checks failed: OCSP response ' 'issuer key hash does not match' ), ), ( 'direct_invalid_wrong_issuer_key_hash', 'ND3_Issuer_Root.pem', [], 'ND3_Cert_EE.pem', [ 'WIKH_ND3.ors', ], 2, datetime(2012, 10, 12, 0, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer key hash does not match' ), ), ( 'delegated_with_intermediate_invalid_wrong_issuer_key_hash', 'R2.pem', [ 'D1_Issuer_ICA.pem', ], 'D1_Cert_EE.pem', [ 'WIKH_D1.ors', ], 3, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer key hash does not match' ), ), ( 'delegated_invalid_wrong_issuer_key_hash', 'D3_Issuer_Root.pem', [], 'D3_Cert_EE.pem', [ 'WIKH_D3.ors', ], 2, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: OCSP response ' 'issuer key hash does not match' ), ), ( 'delegated_with_intermediate_invalid_wrong_key_in_signing_cert', 'R2.pem', [ 'D1_Issuer_ICA.pem', ], 'D1_Cert_EE.pem', [ 'WKDOSC_D1.ors', ], 3, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be validated' ), ), ( 'delegated_invalid_wrong_key_in_signing_cert', 'D3_Issuer_Root.pem', [], 'D3_Cert_EE.pem', [ 'WKDOSC_D3.ors', ], 2, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be validated' ), ), ( 'delegated_with_intermediate_invalid_signature_on_signing_cert', 'R2.pem', [ 'D1_Issuer_ICA.pem', ], 'D1_Cert_EE.pem', [ 'ISDOSC_D1.ors', ], 3, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be validated' ), ), ( 'delegated_invalid_signature_on_signing_cert', 'D3_Issuer_Root.pem', [], 'D3_Cert_EE.pem', [ 'ISDOSC_D3.ors', ], 2, datetime(2012, 10, 11, 14, 0, 0, tzinfo=timezone.utc), PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: Unable to verify ' 'OCSP response since response signing certificate could ' 'not be validated' ), ), ) def test_nist_40301_invalid_name_chaining_ee_test1(self): cert = self._load_cert_object('nist_pkits', 'certs', 'InvalidNameChainingTest1EE.crt') ca_certs = [self._load_nist_cert('TrustAnchorRootCertificate.crt')] other_certs = [ self._load_nist_cert('GoodCACert.crt'), ] crls = [ self._load_nist_crl('GoodCACRL.crl'), self._load_nist_crl('TrustAnchorRootCRL.crl'), ] # Hand build the path since we are testing an issuer mismatch that # will result in a path building error path = ValidationPath(cert) path.prepend(other_certs[0]) path.prepend(ca_certs[0]) self.assertEqual(3, len(path)) context = ValidationContext( trust_roots=ca_certs, other_certs=other_certs, crls=crls ) expected = ( 'The path could not be validated because the end-entity certificate ' 'issuer name could not be matched' ) with self.assertRaisesRegexp(PathValidationError, expected): validate_path(context, path) def test_nist_40302_invalid_name_chaining_order_test2(self): cert = self._load_cert_object('nist_pkits', 'certs', 'InvalidNameChainingOrderTest2EE.crt') ca_certs = [self._load_nist_cert('TrustAnchorRootCertificate.crt')] other_certs = [ self._load_nist_cert('NameOrderingCACert.crt'), ] crls = [ self._load_nist_crl('NameOrderCACRL.crl'), self._load_nist_crl('TrustAnchorRootCRL.crl'), ] # Hand build the path since we are testing an issuer mismatch that # will result in a path building error path = ValidationPath(cert) path.prepend(other_certs[0]) path.prepend(ca_certs[0]) self.assertEqual(3, len(path)) context = ValidationContext( trust_roots=ca_certs, other_certs=other_certs, crls=crls ) expected = ( 'The path could not be validated because the end-entity certificate ' 'issuer name could not be matched' ) with self.assertRaisesRegexp(PathValidationError, expected): validate_path(context, path) @data('nist_info', True) def nist(self, cert_filename, other_cert_files, crl_files, path_len, require_rev, excp_class, excp_msg): cert = self._load_nist_cert(cert_filename) ca_certs = [self._load_nist_cert('TrustAnchorRootCertificate.crt')] other_certs = [self._load_nist_cert(filename) for filename in other_cert_files] crls = [self._load_nist_crl(filename) for filename in crl_files] crls.append(self._load_nist_crl('TrustAnchorRootCRL.crl')) revocation_mode = "require" if require_rev else "hard-fail" context = ValidationContext( trust_roots=ca_certs, other_certs=other_certs, crls=crls, revocation_mode=revocation_mode ) paths = context.certificate_registry.build_paths(cert) self.assertEqual(1, len(paths)) path = paths[0] self.assertEqual(path_len, len(path)) if excp_class: with self.assertRaisesRegexp(excp_class, excp_msg): validate_path(context, path) else: validate_path(context, path) @staticmethod def nist_info(): return ( ( '40101_valid_signatures_test1', 'ValidCertificatePathTest1EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, None, None ), ( '40102_invalid_ca_signature_test2', 'InvalidCASignatureTest2EE.crt', [ 'BadSignedCACert.crt', ], [ 'BadSignedCACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because the signature of ' 'intermediate certificate 1 could not be verified' ), ), ( '40103_invalid_ee_signature_test3', 'InvalidEESignatureTest3EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because the signature of ' 'the end-entity certificate could not be verified' ), ), ( '40104_valid_dsa_signatures_test4', 'ValidDSASignaturesTest4EE.crt', [ 'DSACACert.crt', ], [ 'DSACACRL.crl', ], 3, False, None, None, ), ( '40105_valid_dsa_parameter_inheritance_test5', 'ValidDSAParameterInheritanceTest5EE.crt', [ 'DSACACert.crt', 'DSAParametersInheritedCACert.crt', ], [ 'DSAParametersInheritedCACRL.crl', 'DSACACRL.crl', ], 4, False, None, None, ), ( '40106_invalid_dsa_signature_test6', 'InvalidDSASignatureTest6EE.crt', [ 'DSACACert.crt', ], [ 'DSACACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because the signature of ' 'the end-entity certificate could not be verified' ), ), ( '40201_invalid_ca_notbefore_date_test1', 'InvalidCAnotBeforeDateTest1EE.crt', [ 'BadnotBeforeDateCACert.crt', ], [ 'BadnotBeforeDateCACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because intermediate certificate 1 ' 'is not valid until 2047-01-01 12:01:00Z' ) ), ( '40202_invalid_ee_notbefore_date_test2', 'InvalidEEnotBeforeDateTest2EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because the end-entity certificate ' 'is not valid until 2047-01-01 12:01:00Z' ) ), ( '40203_valid_pre2000_utc_notbefore_date_test3', 'Validpre2000UTCnotBeforeDateTest3EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, None, None, ), ( '40204_valid_generalizedtime_notbefore_date_test4', 'ValidGeneralizedTimenotBeforeDateTest4EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, None, None, ), ( '40205_invalid_ca_notafter_date_test5', 'InvalidCAnotAfterDateTest5EE.crt', [ 'BadnotAfterDateCACert.crt', ], [ 'BadnotAfterDateCACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because intermediate certificate 1 ' 'expired 2011-01-01 08:30:00Z' ) ), ( '40206_invalid_ee_notafter_date_test6', 'InvalidEEnotAfterDateTest6EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because the end-entity certificate ' 'expired 2011-01-01 08:30:00Z' ) ), ( '40207_invalid_pre2000_utc_ee_notafter_date_test7', 'Invalidpre2000UTCEEnotAfterDateTest7EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, PathValidationError, ( 'The path could not be validated because the end-entity certificate ' 'expired 1999-01-01 12:01:00Z' ) ), ( '40208_valid_generalizedtime_notbefore_date_test8', 'ValidGeneralizedTimenotAfterDateTest8EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, None, None, ), ( '40303_valid_name_chaining_whitespace_test3', 'ValidNameChainingWhitespaceTest3EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, None, None, ), ( '40304_valid_name_chaining_whitespace_test4', 'ValidNameChainingWhitespaceTest4EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, None, None, ), ( '40305_valid_name_chaining_capitalization_test5', 'ValidNameChainingCapitalizationTest5EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, False, None, None, ), ( '40306_valid_name_chaining_uids_test6', 'ValidNameUIDsTest6EE.crt', [ 'UIDCACert.crt', ], [ 'UIDCACRL.crl', ], 3, False, None, None, ), ( '40307_valid_rfc3280_mandatory_attribute_types_test7', 'ValidRFC3280MandatoryAttributeTypesTest7EE.crt', [ 'RFC3280MandatoryAttributeTypesCACert.crt', ], [ 'RFC3280MandatoryAttributeTypesCACRL.crl', ], 3, False, None, None, ), ( '40308_valid_rfc3280_optional_attribute_types_test8', 'ValidRFC3280OptionalAttributeTypesTest8EE.crt', [ 'RFC3280OptionalAttributeTypesCACert.crt', ], [ 'RFC3280OptionalAttributeTypesCACRL.crl', ], 3, False, None, None, ), ( '40309_valid_utf8string_encoded_names_test9', 'ValidUTF8StringEncodedNamesTest9EE.crt', [ 'UTF8StringEncodedNamesCACert.crt', ], [ 'UTF8StringEncodedNamesCACRL.crl', ], 3, False, None, None, ), ( '40310_valid_rollover_from_printablestring_to_utf8string_test10', 'ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt', [ 'RolloverfromPrintableStringtoUTF8StringCACert.crt', ], [ 'RolloverfromPrintableStringtoUTF8StringCACRL.crl', ], 3, False, None, None, ), ( '40311_valid_utf8string_case_insensitive_match_test11', 'ValidUTF8StringCaseInsensitiveMatchTest11EE.crt', [ 'UTF8StringCaseInsensitiveMatchCACert.crt', ], [ 'UTF8StringCaseInsensitiveMatchCACRL.crl', ], 3, False, None, None, ), ( '40401_missing_crl_test1', 'InvalidMissingCRLTest1EE.crt', [ 'NoCRLCACert.crt', ], [ ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ) ), ( '40402_invalid_revoked_ca_test2', 'InvalidRevokedCATest2EE.crt', [ 'RevokedsubCACert.crt', 'GoodCACert.crt', ], [ 'GoodCACRL.crl', 'RevokedsubCACRL.crl', ], 4, True, RevokedError, ( 'CRL indicates intermediate certificate 2 was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40403_invalid_revoked_ee_test3', 'InvalidRevokedEETest3EE.crt', [ 'GoodCACert.crt', ], [ 'GoodCACRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:01 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40404_invalid_bad_crl_signature_test4', 'InvalidBadCRLSignatureTest4EE.crt', [ 'BadCRLSignatureCACert.crt', ], [ 'BadCRLSignatureCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: CRL signature could not ' 'be verified' ) ), ( '40405_invalid_bad_crl_issuer_name_test5', 'InvalidBadCRLIssuerNameTest5EE.crt', [ 'BadCRLIssuerNameCACert.crt', ], [ 'BadCRLIssuerNameCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ) ), ( '40406_invalid_wrong_crl_test6', 'InvalidWrongCRLTest6EE.crt', [ 'WrongCRLCACert.crt', ], [ 'WrongCRLCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ) ), ( '40407_valid_two_crls_test7', 'ValidTwoCRLsTest7EE.crt', [ 'TwoCRLsCACert.crt', ], [ 'TwoCRLsCAGoodCRL.crl', 'TwoCRLsCABadCRL.crl', ], 3, True, None, None, ), ( '40408_invalid_unknown_crl_entry_extension_test8', 'InvalidUnknownCRLEntryExtensionTest8EE.crt', [ 'UnknownCRLEntryExtensionCACert.crt', ], [ 'UnknownCRLEntryExtensionCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: One or more critical ' 'extensions are present in the CRL entry for the certificate' ) ), ( '40409_invalid_unknown_crl_extension_test9', 'InvalidUnknownCRLExtensionTest9EE.crt', [ 'UnknownCRLExtensionCACert.crt', ], [ 'UnknownCRLExtensionCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: One or more unrecognized ' 'critical extensions are present in the CRL' ) ), ( '40410_invalid_unknown_crl_extension_test10', 'InvalidUnknownCRLExtensionTest10EE.crt', [ 'UnknownCRLExtensionCACert.crt', ], [ 'UnknownCRLExtensionCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: One or more unrecognized ' 'critical extensions are present in the CRL' ) ), ( '40411_invalid_old_crl_nextupdate_test11', 'InvalidOldCRLnextUpdateTest11EE.crt', [ 'OldCRLnextUpdateCACert.crt', ], [ 'OldCRLnextUpdateCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: CRL should have been ' 'regenerated by the validation time' ) ), ( '40412_invalid_pre2000_crl_nextupdate_test12', 'Invalidpre2000CRLnextUpdateTest12EE.crt', [ 'pre2000CRLnextUpdateCACert.crt', ], [ 'pre2000CRLnextUpdateCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: CRL should have been ' 'regenerated by the validation time' ) ), ( '40413_valid_generalizedtime_crl_nextupdate_test13', 'ValidGeneralizedTimeCRLnextUpdateTest13EE.crt', [ 'GeneralizedTimeCRLnextUpdateCACert.crt', ], [ 'GeneralizedTimeCRLnextUpdateCACRL.crl', ], 3, True, None, None, ), ( '40414_valid_negative_serial_number_test14', 'ValidNegativeSerialNumberTest14EE.crt', [ 'NegativeSerialNumberCACert.crt', ], [ 'NegativeSerialNumberCACRL.crl', ], 3, True, None, None, ), ( '40415_invalid_negative_serial_number_test15', 'InvalidNegativeSerialNumberTest15EE.crt', [ 'NegativeSerialNumberCACert.crt', ], [ 'NegativeSerialNumberCACRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40416_valid_long_serial_number_test16', 'ValidLongSerialNumberTest16EE.crt', [ 'LongSerialNumberCACert.crt', ], [ 'LongSerialNumberCACRL.crl', ], 3, True, None, None, ), ( '40417_valid_long_serial_number_test17', 'ValidLongSerialNumberTest17EE.crt', [ 'LongSerialNumberCACert.crt', ], [ 'LongSerialNumberCACRL.crl', ], 3, True, None, None, ), ( '40418_invalid_long_serial_number_test18', 'InvalidLongSerialNumberTest18EE.crt', [ 'LongSerialNumberCACert.crt', ], [ 'LongSerialNumberCACRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40419_valid_separate_certificate_and_crl_keys_test19', 'ValidSeparateCertificateandCRLKeysTest19EE.crt', [ 'SeparateCertificateandCRLKeysCertificateSigningCACert.crt', 'SeparateCertificateandCRLKeysCRLSigningCert.crt', ], [ 'SeparateCertificateandCRLKeysCRL.crl', ], 3, True, None, None, ), ( '40420_invalid_separate_certificate_and_crl_keys_test20', 'InvalidSeparateCertificateandCRLKeysTest20EE.crt', [ 'SeparateCertificateandCRLKeysCertificateSigningCACert.crt', 'SeparateCertificateandCRLKeysCRLSigningCert.crt', ], [ 'SeparateCertificateandCRLKeysCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40421_invalid_separate_certificate_and_crl_keys_test21', 'InvalidSeparateCertificateandCRLKeysTest21EE.crt', [ 'SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt', 'SeparateCertificateandCRLKeysCA2CRLSigningCert.crt', ], [ 'SeparateCertificateandCRLKeysCA2CRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the intermediate certificate 1 CRL issuer was ' 'revoked at 08:30:00 on 2010-01-01, due to a compromised key' ) ), ( '40501_valid_basic_self_issued_old_with_new_test1', 'ValidBasicSelfIssuedOldWithNewTest1EE.crt', [ 'BasicSelfIssuedNewKeyOldWithNewCACert.crt', 'BasicSelfIssuedNewKeyCACert.crt', ], [ 'BasicSelfIssuedNewKeyCACRL.crl', ], 4, True, None, None, ), ( '40502_invalid_basic_self_issued_old_with_new_test2', 'InvalidBasicSelfIssuedOldWithNewTest2EE.crt', [ 'BasicSelfIssuedNewKeyOldWithNewCACert.crt', 'BasicSelfIssuedNewKeyCACert.crt', ], [ 'BasicSelfIssuedNewKeyCACRL.crl', ], 4, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40503_valid_basic_self_issued_new_with_old_test3', 'ValidBasicSelfIssuedNewWithOldTest3EE.crt', [ 'BasicSelfIssuedOldKeyCACert.crt', 'BasicSelfIssuedOldKeyNewWithOldCACert.crt', ], [ 'BasicSelfIssuedOldKeySelfIssuedCertCRL.crl', 'BasicSelfIssuedOldKeyCACRL.crl', ], 4, True, None, None, ), ( '40504_valid_basic_self_issued_new_with_old_test4', 'ValidBasicSelfIssuedNewWithOldTest4EE.crt', [ 'BasicSelfIssuedOldKeyCACert.crt', 'BasicSelfIssuedOldKeyNewWithOldCACert.crt', ], [ 'BasicSelfIssuedOldKeySelfIssuedCertCRL.crl', 'BasicSelfIssuedOldKeyCACRL.crl', ], 3, True, None, None, ), ( '40505_invalid_basic_self_issued_new_with_old_test5', 'InvalidBasicSelfIssuedNewWithOldTest5EE.crt', [ 'BasicSelfIssuedOldKeyCACert.crt', 'BasicSelfIssuedOldKeyNewWithOldCACert.crt', ], [ 'BasicSelfIssuedOldKeySelfIssuedCertCRL.crl', 'BasicSelfIssuedOldKeyCACRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40506_valid_basic_self_issued_crl_signing_key_test6', 'ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt', [ 'BasicSelfIssuedCRLSigningKeyCACert.crt', 'BasicSelfIssuedCRLSigningKeyCRLCert.crt', ], [ 'BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl', 'BasicSelfIssuedCRLSigningKeyCACRL.crl', ], 3, True, None, None, ), ( '40507_invalid_basic_self_issued_crl_signing_key_test7', 'InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt', [ 'BasicSelfIssuedCRLSigningKeyCACert.crt', 'BasicSelfIssuedCRLSigningKeyCRLCert.crt', ], [ 'BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl', 'BasicSelfIssuedCRLSigningKeyCACRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ) ), ( '40508_invalid_basic_self_issued_crl_signing_key_test8', 'InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt', [ 'BasicSelfIssuedCRLSigningKeyCACert.crt', 'BasicSelfIssuedCRLSigningKeyCRLCert.crt', ], [ 'BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl', 'BasicSelfIssuedCRLSigningKeyCACRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because intermediate certificate ' '2 is not a CA' ) ), ( '40601_invalid_missing_basicconstraints_test1', 'InvalidMissingbasicConstraintsTest1EE.crt', [ 'MissingbasicConstraintsCACert.crt', ], [ 'MissingbasicConstraintsCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because intermediate certificate ' '1 is not a CA' ) ), ( '40602_invalid_ca_false_test2', 'InvalidcAFalseTest2EE.crt', [ 'basicConstraintsCriticalcAFalseCACert.crt', ], [ 'basicConstraintsCriticalcAFalseCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because intermediate certificate ' '1 is not a CA' ) ), ( '40603_invalid_ca_false_test3', 'InvalidcAFalseTest3EE.crt', [ 'basicConstraintsNotCriticalcAFalseCACert.crt', ], [ 'basicConstraintsNotCriticalcAFalseCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because intermediate certificate ' '1 is not a CA' ) ), ( '40604_valid_basicconstraints_not_critical_test4', 'ValidbasicConstraintsNotCriticalTest4EE.crt', [ 'basicConstraintsNotCriticalCACert.crt', ], [ 'basicConstraintsNotCriticalCACRL.crl', ], 3, True, None, None, ), ( '40605_invalid_pathlenconstraint_test5', 'InvalidpathLenConstraintTest5EE.crt', [ 'pathLenConstraint0CACert.crt', 'pathLenConstraint0subCACert.crt', ], [ 'pathLenConstraint0CACRL.crl', 'pathLenConstraint0subCACRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because it exceeds the maximum ' 'path length' ) ), ( '40606_invalid_pathlenconstraint_test6', 'InvalidpathLenConstraintTest6EE.crt', [ 'pathLenConstraint0CACert.crt', 'pathLenConstraint0subCACert.crt', ], [ 'pathLenConstraint0CACRL.crl', 'pathLenConstraint0subCACRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because it exceeds the maximum ' 'path length' ) ), ( '40607_valid_pathlenconstraint_test7', 'ValidpathLenConstraintTest7EE.crt', [ 'pathLenConstraint0CACert.crt', ], [ 'pathLenConstraint0CACRL.crl', ], 3, True, None, None, ), ( '40608_valid_pathlenconstraint_test8', 'ValidpathLenConstraintTest8EE.crt', [ 'pathLenConstraint0CACert.crt', ], [ 'pathLenConstraint0CACRL.crl', ], 3, True, None, None, ), ( '40609_invalid_pathlenconstraint_test9', 'InvalidpathLenConstraintTest9EE.crt', [ 'pathLenConstraint6CACert.crt', 'pathLenConstraint6subCA0Cert.crt', 'pathLenConstraint6subsubCA00Cert.crt', ], [ 'pathLenConstraint6CACRL.crl', 'pathLenConstraint6subCA0CRL.crl', 'pathLenConstraint6subsubCA00CRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because it exceeds the maximum ' 'path length' ) ), ( '40610_invalid_pathlenconstraint_test10', 'InvalidpathLenConstraintTest10EE.crt', [ 'pathLenConstraint6CACert.crt', 'pathLenConstraint6subCA0Cert.crt', 'pathLenConstraint6subsubCA00Cert.crt', ], [ 'pathLenConstraint6CACRL.crl', 'pathLenConstraint6subCA0CRL.crl', 'pathLenConstraint6subsubCA00CRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because it exceeds the maximum ' 'path length' ) ), ( '40611_invalid_pathlenconstraint_test11', 'InvalidpathLenConstraintTest11EE.crt', [ 'pathLenConstraint6CACert.crt', 'pathLenConstraint6subCA1Cert.crt', 'pathLenConstraint6subsubCA11Cert.crt', 'pathLenConstraint6subsubsubCA11XCert.crt', ], [ 'pathLenConstraint6CACRL.crl', 'pathLenConstraint6subCA1CRL.crl', 'pathLenConstraint6subsubCA11CRL.crl', 'pathLenConstraint6subsubsubCA11XCRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because it exceeds the maximum ' 'path length' ) ), ( '40612_invalid_pathlenconstraint_test12', 'InvalidpathLenConstraintTest12EE.crt', [ 'pathLenConstraint6CACert.crt', 'pathLenConstraint6subCA1Cert.crt', 'pathLenConstraint6subsubCA11Cert.crt', 'pathLenConstraint6subsubsubCA11XCert.crt', ], [ 'pathLenConstraint6CACRL.crl', 'pathLenConstraint6subCA1CRL.crl', 'pathLenConstraint6subsubCA11CRL.crl', 'pathLenConstraint6subsubsubCA11XCRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because it exceeds the maximum ' 'path length' ) ), ( '40613_valid_pathlenconstraint_test13', 'ValidpathLenConstraintTest13EE.crt', [ 'pathLenConstraint6CACert.crt', 'pathLenConstraint6subCA4Cert.crt', 'pathLenConstraint6subsubCA41Cert.crt', 'pathLenConstraint6subsubsubCA41XCert.crt', ], [ 'pathLenConstraint6CACRL.crl', 'pathLenConstraint6subCA4CRL.crl', 'pathLenConstraint6subsubCA41CRL.crl', 'pathLenConstraint6subsubsubCA41XCRL.crl', ], 6, True, None, None, ), ( '40614_valid_pathlenconstraint_test14', 'ValidpathLenConstraintTest14EE.crt', [ 'pathLenConstraint6CACert.crt', 'pathLenConstraint6subCA4Cert.crt', 'pathLenConstraint6subsubCA41Cert.crt', 'pathLenConstraint6subsubsubCA41XCert.crt', ], [ 'pathLenConstraint6CACRL.crl', 'pathLenConstraint6subCA4CRL.crl', 'pathLenConstraint6subsubCA41CRL.crl', 'pathLenConstraint6subsubsubCA41XCRL.crl', ], 6, True, None, None, ), ( '40615_valid_self_issued_pathlenconstraint_test15', 'ValidSelfIssuedpathLenConstraintTest15EE.crt', [ 'pathLenConstraint0CACert.crt', 'pathLenConstraint0SelfIssuedCACert.crt', ], [ 'pathLenConstraint0CACRL.crl', ], 4, True, None, None, ), ( '40616_invalid_self_issued_pathlenconstraint_test16', 'InvalidSelfIssuedpathLenConstraintTest16EE.crt', [ 'pathLenConstraint0CACert.crt', 'pathLenConstraint0SelfIssuedCACert.crt', 'pathLenConstraint0subCA2Cert.crt', ], [ 'pathLenConstraint0CACRL.crl', 'pathLenConstraint0subCA2CRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because it exceeds the maximum ' 'path length' ) ), ( '40617_valid_self_issued_pathlenconstraint_test17', 'ValidSelfIssuedpathLenConstraintTest17EE.crt', [ 'pathLenConstraint1CACert.crt', 'pathLenConstraint1SelfIssuedCACert.crt', 'pathLenConstraint1subCACert.crt', 'pathLenConstraint1SelfIssuedsubCACert.crt', ], [ 'pathLenConstraint1CACRL.crl', 'pathLenConstraint1subCACRL.crl', ], 6, True, None, None, ), ( '40701_invalid_keyusage_critical_keycertsign_false_test1', 'InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt', [ 'keyUsageCriticalkeyCertSignFalseCACert.crt', ], [ 'keyUsageCriticalkeyCertSignFalseCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because intermediate certificate ' '1 is not allowed to sign certificates' ) ), ( '40702_invalid_keyusage_not_critical_keycertsign_false_test2', 'InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt', [ 'keyUsageNotCriticalkeyCertSignFalseCACert.crt', ], [ 'keyUsageNotCriticalkeyCertSignFalseCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because intermediate certificate ' '1 is not allowed to sign certificates' ) ), ( '40703_valid_keyusage_not_critical_test3', 'ValidkeyUsageNotCriticalTest3EE.crt', [ 'keyUsageNotCriticalCACert.crt', ], [ 'keyUsageNotCriticalCACRL.crl', ], 3, True, None, None, ), ( '40704_invalid_keyusage_critical_crlsign_false_test4', 'InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt', [ 'keyUsageCriticalcRLSignFalseCACert.crt', ], [ 'keyUsageCriticalcRLSignFalseCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: The CRL issuer is not ' 'authorized to sign CRLs' ) ), ( '40705_invalid_keyusage_not_critical_crlsign_false_test5', 'InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt', [ 'keyUsageNotCriticalcRLSignFalseCACert.crt', ], [ 'keyUsageNotCriticalcRLSignFalseCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: The CRL issuer is not ' 'authorized to sign CRLs' ) ), ( '40802_all_certificates_no_policies_test2', 'AllCertificatesNoPoliciesTest2EE.crt', [ 'NoPoliciesCACert.crt', ], [ 'NoPoliciesCACRL.crl', ], 3, True, None, None ), ( '40803_different_policies_test3', 'DifferentPoliciesTest3EE.crt', [ 'GoodCACert.crt', 'PoliciesP2subCACert.crt', ], [ 'GoodCACRL.crl', 'PoliciesP2subCACRL.crl', ], 4, True, None, None ), ( '40804_different_policies_test4', 'DifferentPoliciesTest4EE.crt', [ 'GoodCACert.crt', 'GoodsubCACert.crt', ], [ 'GoodCACRL.crl', 'GoodsubCACRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '40805_different_policies_test5', 'DifferentPoliciesTest5EE.crt', [ 'GoodCACert.crt', 'PoliciesP2subCA2Cert.crt', ], [ 'GoodCACRL.crl', 'PoliciesP2subCA2CRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '40806_overlapping_policies_test3', 'OverlappingPoliciesTest6EE.crt', [ 'PoliciesP1234CACert.crt', 'PoliciesP1234subCAP123Cert.crt', 'PoliciesP1234subsubCAP123P12Cert.crt', ], [ 'PoliciesP1234CACRL.crl', 'PoliciesP1234subCAP123CRL.crl', 'PoliciesP1234subsubCAP123P12CRL.crl', ], 5, True, None, None ), ( '40807_different_policies_test7', 'DifferentPoliciesTest7EE.crt', [ 'PoliciesP123CACert.crt', 'PoliciesP123subCAP12Cert.crt', 'PoliciesP123subsubCAP12P1Cert.crt', ], [ 'PoliciesP123CACRL.crl', 'PoliciesP123subCAP12CRL.crl', 'PoliciesP123subsubCAP12P1CRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '40808_different_policies_test8', 'DifferentPoliciesTest8EE.crt', [ 'PoliciesP12CACert.crt', 'PoliciesP12subCAP1Cert.crt', 'PoliciesP12subsubCAP1P2Cert.crt', ], [ 'PoliciesP12CACRL.crl', 'PoliciesP12subCAP1CRL.crl', 'PoliciesP12subsubCAP1P2CRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for intermediate certificate 3' ) ), ( '40809_different_policies_test9', 'DifferentPoliciesTest9EE.crt', [ 'PoliciesP123CACert.crt', 'PoliciesP123subCAP12Cert.crt', 'PoliciesP123subsubCAP12P2Cert.crt', 'PoliciesP123subsubsubCAP12P2P1Cert.crt', ], [ 'PoliciesP123CACRL.crl', 'PoliciesP123subCAP12CRL.crl', 'PoliciesP123subsubCAP2P2CRL.crl', 'PoliciesP123subsubsubCAP12P2P1CRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for intermediate certificate 4' ) ), ( '40810_all_certificates_same_policies_test10', 'AllCertificatesSamePoliciesTest10EE.crt', [ 'PoliciesP12CACert.crt', ], [ 'PoliciesP12CACRL.crl', ], 3, True, None, None ), ( '40811_all_certificates_any_policy_test10', 'AllCertificatesanyPolicyTest11EE.crt', [ 'anyPolicyCACert.crt', ], [ 'anyPolicyCACRL.crl', ], 3, True, None, None ), ( '40812_different_policies_test12', 'DifferentPoliciesTest12EE.crt', [ 'PoliciesP3CACert.crt', ], [ 'PoliciesP3CACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '40813_all_certificates_same_policies_test13', 'AllCertificatesSamePoliciesTest13EE.crt', [ 'PoliciesP123CACert.crt', ], [ 'PoliciesP123CACRL.crl', ], 3, True, None, None ), ( '40814_any_policy_test14', 'AnyPolicyTest14EE.crt', [ 'anyPolicyCACert.crt', ], [ 'anyPolicyCACRL.crl', ], 3, True, None, None ), ( '40901_valid_require_explicit_policy_test1', 'ValidrequireExplicitPolicyTest1EE.crt', [ 'requireExplicitPolicy10CACert.crt', 'requireExplicitPolicy10subCACert.crt', 'requireExplicitPolicy10subsubCACert.crt', 'requireExplicitPolicy10subsubsubCACert.crt', ], [ 'requireExplicitPolicy10CACRL.crl', 'requireExplicitPolicy10subCACRL.crl', 'requireExplicitPolicy10subsubCACRL.crl', 'requireExplicitPolicy10subsubsubCACRL.crl', ], 6, True, None, None ), ( '40902_valid_require_explicit_policy_test2', 'ValidrequireExplicitPolicyTest2EE.crt', [ 'requireExplicitPolicy5CACert.crt', 'requireExplicitPolicy5subCACert.crt', 'requireExplicitPolicy5subsubCACert.crt', 'requireExplicitPolicy5subsubsubCACert.crt', ], [ 'requireExplicitPolicy5CACRL.crl', 'requireExplicitPolicy5subCACRL.crl', 'requireExplicitPolicy5subsubCACRL.crl', 'requireExplicitPolicy5subsubsubCACRL.crl', ], 6, True, None, None ), ( '40903_invalid_require_explicit_policy_test3', 'InvalidrequireExplicitPolicyTest3EE.crt', [ 'requireExplicitPolicy4CACert.crt', 'requireExplicitPolicy4subCACert.crt', 'requireExplicitPolicy4subsubCACert.crt', 'requireExplicitPolicy4subsubsubCACert.crt', ], [ 'requireExplicitPolicy4CACRL.crl', 'requireExplicitPolicy4subCACRL.crl', 'requireExplicitPolicy4subsubCACRL.crl', 'requireExplicitPolicy4subsubsubCACRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '40904_valid_require_explicit_policy_test4', 'ValidrequireExplicitPolicyTest4EE.crt', [ 'requireExplicitPolicy0CACert.crt', 'requireExplicitPolicy0subCACert.crt', 'requireExplicitPolicy0subsubCACert.crt', 'requireExplicitPolicy0subsubsubCACert.crt', ], [ 'requireExplicitPolicy0CACRL.crl', 'requireExplicitPolicy0subCACRL.crl', 'requireExplicitPolicy0subsubCACRL.crl', 'requireExplicitPolicy0subsubsubCACRL.crl', ], 6, True, None, None ), ( '40905_invalid_require_explicit_policy_test5', 'InvalidrequireExplicitPolicyTest5EE.crt', [ 'requireExplicitPolicy7CACert.crt', 'requireExplicitPolicy7subCARE2Cert.crt', 'requireExplicitPolicy7subsubCARE2RE4Cert.crt', 'requireExplicitPolicy7subsubsubCARE2RE4Cert.crt', ], [ 'requireExplicitPolicy7CACRL.crl', 'requireExplicitPolicy7subCARE2CRL.crl', 'requireExplicitPolicy7subsubCARE2RE4CRL.crl', 'requireExplicitPolicy7subsubsubCARE2RE4CRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '40906_valid_self_issued_require_explicit_policy_test6', 'ValidSelfIssuedrequireExplicitPolicyTest6EE.crt', [ 'requireExplicitPolicy2CACert.crt', 'requireExplicitPolicy2SelfIssuedCACert.crt', ], [ 'requireExplicitPolicy2CACRL.crl', ], 4, True, None, None ), ( '40907_invalid_self_issued_require_explicit_policy_test7', 'InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt', [ 'requireExplicitPolicy2CACert.crt', 'requireExplicitPolicy2SelfIssuedCACert.crt', 'requireExplicitPolicy2subCACert.crt', ], [ 'requireExplicitPolicy2CACRL.crl', 'requireExplicitPolicy2subCACRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '40908_invalid_self_issued_require_explicit_policy_test8', 'InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt', [ 'requireExplicitPolicy2CACert.crt', 'requireExplicitPolicy2SelfIssuedCACert.crt', 'requireExplicitPolicy2subCACert.crt', 'requireExplicitPolicy2SelfIssuedsubCACert.crt', ], [ 'requireExplicitPolicy2CACRL.crl', 'requireExplicitPolicy2subCACRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41002_invalid_policy_mapping_test2', 'InvalidPolicyMappingTest2EE.crt', [ 'Mapping1to2CACert.crt', ], [ 'Mapping1to2CACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41004_invalid_policy_mapping_test4', 'InvalidPolicyMappingTest4EE.crt', [ 'P12Mapping1to3CACert.crt', 'P12Mapping1to3subCACert.crt', 'P12Mapping1to3subsubCACert.crt', ], [ 'P12Mapping1to3CACRL.crl', 'P12Mapping1to3subCACRL.crl', 'P12Mapping1to3subsubCACRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41007_invalid_mapping_from_any_policy_test7', 'InvalidMappingFromanyPolicyTest7EE.crt', [ 'MappingFromanyPolicyCACert.crt', ], [ 'MappingFromanyPolicyCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because intermediate ' 'certificate 1 contains a policy mapping for the ' '"any policy"' ) ), ( '41008_invalid_mapping_to_any_policy_test8', 'InvalidMappingToanyPolicyTest8EE.crt', [ 'MappingToanyPolicyCACert.crt', ], [ 'MappingToanyPolicyCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because intermediate ' 'certificate 1 contains a policy mapping for the ' '"any policy"' ) ), ( '41009_valid_policy_mapping_test9', 'ValidPolicyMappingTest9EE.crt', [ 'PanyPolicyMapping1to2CACert.crt', ], [ 'PanyPolicyMapping1to2CACRL.crl', ], 3, True, None, None ), ( '41010_invalid_policy_mapping_test10', 'InvalidPolicyMappingTest10EE.crt', [ 'GoodCACert.crt', 'GoodsubCAPanyPolicyMapping1to2CACert.crt', ], [ 'GoodCACRL.crl', 'GoodsubCAPanyPolicyMapping1to2CACRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41011_valid_policy_mapping_test11', 'ValidPolicyMappingTest11EE.crt', [ 'GoodCACert.crt', 'GoodsubCAPanyPolicyMapping1to2CACert.crt', ], [ 'GoodCACRL.crl', 'GoodsubCAPanyPolicyMapping1to2CACRL.crl' ], 4, True, None, None ), ( '41013_valid_policy_mapping_test13', 'ValidPolicyMappingTest13EE.crt', [ 'P1anyPolicyMapping1to2CACert.crt', ], [ 'P1anyPolicyMapping1to2CACRL.crl' ], 3, True, None, None ), ( '41014_valid_policy_mapping_test14', 'ValidPolicyMappingTest14EE.crt', [ 'P1anyPolicyMapping1to2CACert.crt', ], [ 'P1anyPolicyMapping1to2CACRL.crl' ], 3, True, None, None ), ( '41101_invalid_inhibit_policy_mapping_test1', 'InvalidinhibitPolicyMappingTest1EE.crt', [ 'inhibitPolicyMapping0CACert.crt', 'inhibitPolicyMapping0subCACert.crt', ], [ 'inhibitPolicyMapping0CACRL.crl', 'inhibitPolicyMapping0subCACRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41102_valid_inhibit_policy_mapping_test2', 'ValidinhibitPolicyMappingTest2EE.crt', [ 'inhibitPolicyMapping1P12CACert.crt', 'inhibitPolicyMapping1P12subCACert.crt', ], [ 'inhibitPolicyMapping1P12CACRL.crl', 'inhibitPolicyMapping1P12subCACRL.crl', ], 4, True, None, None ), ( '41103_invalid_inhibit_policy_mapping_test3', 'InvalidinhibitPolicyMappingTest3EE.crt', [ 'inhibitPolicyMapping1P12CACert.crt', 'inhibitPolicyMapping1P12subCACert.crt', 'inhibitPolicyMapping1P12subsubCACert.crt', ], [ 'inhibitPolicyMapping1P12CACRL.crl', 'inhibitPolicyMapping1P12subCACRL.crl', 'inhibitPolicyMapping1P12subsubCACRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41104_valid_inhibit_policy_mapping_test4', 'ValidinhibitPolicyMappingTest4EE.crt', [ 'inhibitPolicyMapping1P12CACert.crt', 'inhibitPolicyMapping1P12subCACert.crt', 'inhibitPolicyMapping1P12subsubCACert.crt', ], [ 'inhibitPolicyMapping1P12CACRL.crl', 'inhibitPolicyMapping1P12subCACRL.crl', 'inhibitPolicyMapping1P12subsubCACRL.crl', ], 5, True, None, None ), ( '41105_invalid_inhibit_policy_mapping_test5', 'InvalidinhibitPolicyMappingTest5EE.crt', [ 'inhibitPolicyMapping5CACert.crt', 'inhibitPolicyMapping5subCACert.crt', 'inhibitPolicyMapping5subsubCACert.crt', 'inhibitPolicyMapping5subsubsubCACert.crt', ], [ 'inhibitPolicyMapping5CACRL.crl', 'inhibitPolicyMapping5subCACRL.crl', 'inhibitPolicyMapping5subsubCACRL.crl', 'inhibitPolicyMapping5subsubsubCACRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41106_invalid_inhibit_policy_mapping_test6', 'InvalidinhibitPolicyMappingTest6EE.crt', [ 'inhibitPolicyMapping1P12CACert.crt', 'inhibitPolicyMapping1P12subCAIPM5Cert.crt', 'inhibitPolicyMapping1P12subsubCAIPM5Cert.crt', ], [ 'inhibitPolicyMapping1P12CACRL.crl', 'inhibitPolicyMapping1P12subCAIPM5CRL.crl', 'inhibitPolicyMapping1P12subsubCAIPM5CRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41107_valid_self_issued_inhibit_policy_mapping_test7', 'ValidSelfIssuedinhibitPolicyMappingTest7EE.crt', [ 'inhibitPolicyMapping1P1CACert.crt', 'inhibitPolicyMapping1P1SelfIssuedCACert.crt', 'inhibitPolicyMapping1P1subCACert.crt', ], [ 'inhibitPolicyMapping1P1CACRL.crl', 'inhibitPolicyMapping1P1subCACRL.crl', ], 5, True, None, None ), ( '41108_invalid_self_issued_inhibit_policy_mapping_test8', 'InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt', [ 'inhibitPolicyMapping1P1CACert.crt', 'inhibitPolicyMapping1P1SelfIssuedCACert.crt', 'inhibitPolicyMapping1P1subCACert.crt', 'inhibitPolicyMapping1P1subsubCACert.crt', ], [ 'inhibitPolicyMapping1P1CACRL.crl', 'inhibitPolicyMapping1P1subCACRL.crl', 'inhibitPolicyMapping1P1subsubCACRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41109_invalid_self_issued_inhibit_policy_mapping_test9', 'InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt', [ 'inhibitPolicyMapping1P1CACert.crt', 'inhibitPolicyMapping1P1SelfIssuedCACert.crt', 'inhibitPolicyMapping1P1subCACert.crt', 'inhibitPolicyMapping1P1subsubCACert.crt', ], [ 'inhibitPolicyMapping1P1CACRL.crl', 'inhibitPolicyMapping1P1subCACRL.crl', 'inhibitPolicyMapping1P1subsubCACRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41110_invalid_self_issued_inhibit_policy_mapping_test10', 'InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt', [ 'inhibitPolicyMapping1P1CACert.crt', 'inhibitPolicyMapping1P1SelfIssuedCACert.crt', 'inhibitPolicyMapping1P1subCACert.crt', 'inhibitPolicyMapping1P1SelfIssuedsubCACert.crt', ], [ 'inhibitPolicyMapping1P1CACRL.crl', 'inhibitPolicyMapping1P1subCACRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41111_invalid_self_issued_inhibit_policy_mapping_test11', 'InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt', [ 'inhibitPolicyMapping1P1CACert.crt', 'inhibitPolicyMapping1P1SelfIssuedCACert.crt', 'inhibitPolicyMapping1P1subCACert.crt', 'inhibitPolicyMapping1P1SelfIssuedsubCACert.crt', ], [ 'inhibitPolicyMapping1P1CACRL.crl', 'inhibitPolicyMapping1P1subCACRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41201_invalid_inhibit_any_policy_test1', 'InvalidinhibitAnyPolicyTest1EE.crt', [ 'inhibitAnyPolicy0CACert.crt', ], [ 'inhibitAnyPolicy0CACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41202_valid_inhibit_any_policy_test2', 'ValidinhibitAnyPolicyTest2EE.crt', [ 'inhibitAnyPolicy0CACert.crt', ], [ 'inhibitAnyPolicy0CACRL.crl', ], 3, True, None, None ), ( '41203_inhibit_any_policy_test3', 'inhibitAnyPolicyTest3EE.crt', [ 'inhibitAnyPolicy1CACert.crt', 'inhibitAnyPolicy1subCA1Cert.crt', ], [ 'inhibitAnyPolicy1CACRL.crl', 'inhibitAnyPolicy1subCA1CRL.crl', ], 4, True, None, None ), ( '41204_invalid_inhibit_any_policy_test4', 'InvalidinhibitAnyPolicyTest4EE.crt', [ 'inhibitAnyPolicy1CACert.crt', 'inhibitAnyPolicy1subCA1Cert.crt', ], [ 'inhibitAnyPolicy1CACRL.crl', 'inhibitAnyPolicy1subCA1CRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41205_invalid_inhibit_any_policy_test5', 'InvalidinhibitAnyPolicyTest5EE.crt', [ 'inhibitAnyPolicy5CACert.crt', 'inhibitAnyPolicy5subCACert.crt', 'inhibitAnyPolicy5subsubCACert.crt', ], [ 'inhibitAnyPolicy5CACRL.crl', 'inhibitAnyPolicy5subCACRL.crl', 'inhibitAnyPolicy5subsubCACRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41206_invalid_inhibit_any_policy_test6', 'InvalidinhibitAnyPolicyTest6EE.crt', [ 'inhibitAnyPolicy1CACert.crt', 'inhibitAnyPolicy1subCAIAP5Cert.crt', ], [ 'inhibitAnyPolicy1CACRL.crl', 'inhibitAnyPolicy1subCAIAP5CRL.crl', ], 4, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41207_valid_self_issued_inhibit_any_policy_test7', 'ValidSelfIssuedinhibitAnyPolicyTest7EE.crt', [ 'inhibitAnyPolicy1CACert.crt', 'inhibitAnyPolicy1SelfIssuedCACert.crt', 'inhibitAnyPolicy1subCA2Cert.crt', ], [ 'inhibitAnyPolicy1CACRL.crl', 'inhibitAnyPolicy1subCA2CRL.crl', ], 5, True, None, None ), ( '41208_invalid_self_issued_inhibit_any_policy_test8', 'InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt', [ 'inhibitAnyPolicy1CACert.crt', 'inhibitAnyPolicy1SelfIssuedCACert.crt', 'inhibitAnyPolicy1subCA2Cert.crt', 'inhibitAnyPolicy1subsubCA2Cert.crt', ], [ 'inhibitAnyPolicy1CACRL.crl', 'inhibitAnyPolicy1subCA2CRL.crl', 'inhibitAnyPolicy1subsubCA2CRL.crl', ], 6, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for intermediate certificate 4' ) ), ( '41209_valid_self_issued_inhibit_any_policy_test9', 'ValidSelfIssuedinhibitAnyPolicyTest9EE.crt', [ 'inhibitAnyPolicy1CACert.crt', 'inhibitAnyPolicy1SelfIssuedCACert.crt', 'inhibitAnyPolicy1subCA2Cert.crt', 'inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt', ], [ 'inhibitAnyPolicy1CACRL.crl', 'inhibitAnyPolicy1subCA2CRL.crl', ], 6, True, None, None ), ( '41210_invalid_self_issued_inhibit_any_policy_test10', 'InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt', [ 'inhibitAnyPolicy1CACert.crt', 'inhibitAnyPolicy1SelfIssuedCACert.crt', 'inhibitAnyPolicy1subCA2Cert.crt', ], [ 'inhibitAnyPolicy1CACRL.crl', 'inhibitAnyPolicy1subCA2CRL.crl', ], 5, True, PathValidationError, ( 'The path could not be validated because there is no valid ' 'set of policies for the end-entity certificate' ) ), ( '41401_valid_distributionpoint_test1', 'ValiddistributionPointTest1EE.crt', [ 'distributionPoint1CACert.crt', ], [ 'distributionPoint1CACRL.crl', ], 3, True, None, None, ), ( '41402_invalid_distributionpoint_test2', 'InvaliddistributionPointTest2EE.crt', [ 'distributionPoint1CACert.crt', ], [ 'distributionPoint1CACRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41403_invalid_distributionpoint_test3', 'InvaliddistributionPointTest3EE.crt', [ 'distributionPoint1CACert.crt', ], [ 'distributionPoint1CACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ), ), ( '41404_valid_distributionpoint_test4', 'ValiddistributionPointTest4EE.crt', [ 'distributionPoint1CACert.crt', ], [ 'distributionPoint1CACRL.crl', ], 3, True, None, None, ), ( '41405_valid_distributionpoint_test5', 'ValiddistributionPointTest5EE.crt', [ 'distributionPoint2CACert.crt', ], [ 'distributionPoint2CACRL.crl', ], 3, True, None, None, ), ( '41406_invalid_distributionpoint_test6', 'InvaliddistributionPointTest6EE.crt', [ 'distributionPoint2CACert.crt', ], [ 'distributionPoint2CACRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41407_valid_distributionpoint_test7', 'ValiddistributionPointTest7EE.crt', [ 'distributionPoint2CACert.crt', ], [ 'distributionPoint2CACRL.crl', ], 3, True, None, None, ), ( '41408_invalid_distributionpoint_test8', 'InvaliddistributionPointTest8EE.crt', [ 'distributionPoint2CACert.crt', ], [ 'distributionPoint2CACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ), ), ( '41409_invalid_distributionpoint_test9', 'InvaliddistributionPointTest9EE.crt', [ 'distributionPoint2CACert.crt', ], [ 'distributionPoint2CACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ), ), ( '41410_valid_no_issuingdistributionpoint_test10', 'ValidNoissuingDistributionPointTest10EE.crt', [ 'NoissuingDistributionPointCACert.crt', ], [ 'NoissuingDistributionPointCACRL.crl', ], 3, True, None, None, ), ( '41411_invalid_onlycontainsusercerts_crl_test11', 'InvalidonlyContainsUserCertsTest11EE.crt', [ 'onlyContainsUserCertsCACert.crt', ], [ 'onlyContainsUserCertsCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: CRL only contains ' 'end-entity certificates and certificate is a CA certificate' ), ), ( '41412_invalid_onlycontainscacerts_crl_test12', 'InvalidonlyContainsCACertsTest12EE.crt', [ 'onlyContainsCACertsCACert.crt', ], [ 'onlyContainsCACertsCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: CRL only contains ' 'CA certificates and certificate is an end-entity certificate' ), ), ( '41413_valid_onlycontainscacerts_crl_test13', 'ValidonlyContainsCACertsTest13EE.crt', [ 'onlyContainsCACertsCACert.crt', ], [ 'onlyContainsCACertsCACRL.crl', ], 3, True, None, None, ), ( '41414_invalid_onlycontainsattributecerts_crl_test14', 'InvalidonlyContainsAttributeCertsTest14EE.crt', [ 'onlyContainsAttributeCertsCACert.crt', ], [ 'onlyContainsAttributeCertsCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: CRL only contains attribute ' 'certificates' ), ), ( '41415_invalid_onlysomereasons_test15', 'InvalidonlySomeReasonsTest15EE.crt', [ 'onlySomeReasonsCA1Cert.crt', ], [ 'onlySomeReasonsCA1compromiseCRL.crl', 'onlySomeReasonsCA1otherreasonsCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41416_invalid_onlysomereasons_test16', 'InvalidonlySomeReasonsTest16EE.crt', [ 'onlySomeReasonsCA1Cert.crt', ], [ 'onlySomeReasonsCA1compromiseCRL.crl', 'onlySomeReasonsCA1otherreasonsCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a certificate hold' ), ), ( '41417_invalid_onlysomereasons_test17', 'InvalidonlySomeReasonsTest17EE.crt', [ 'onlySomeReasonsCA2Cert.crt', ], [ 'onlySomeReasonsCA2CRL1.crl', 'onlySomeReasonsCA2CRL2.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: The available CRLs do not ' 'cover all revocation reasons' ), ), ( '41418_valid_onlysomereasons_test18', 'ValidonlySomeReasonsTest18EE.crt', [ 'onlySomeReasonsCA3Cert.crt', ], [ 'onlySomeReasonsCA3compromiseCRL.crl', 'onlySomeReasonsCA3otherreasonsCRL.crl', ], 3, True, None, None, ), ( '41419_valid_onlysomereasons_test19', 'ValidonlySomeReasonsTest19EE.crt', [ 'onlySomeReasonsCA4Cert.crt', ], [ 'onlySomeReasonsCA4compromiseCRL.crl', 'onlySomeReasonsCA4otherreasonsCRL.crl', ], 3, True, None, None, ), ( '41420_invalid_onlysomereasons_test20', 'InvalidonlySomeReasonsTest20EE.crt', [ 'onlySomeReasonsCA4Cert.crt', ], [ 'onlySomeReasonsCA4compromiseCRL.crl', 'onlySomeReasonsCA4otherreasonsCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41421_invalid_onlysomereasons_test21', 'InvalidonlySomeReasonsTest21EE.crt', [ 'onlySomeReasonsCA4Cert.crt', ], [ 'onlySomeReasonsCA4compromiseCRL.crl', 'onlySomeReasonsCA4otherreasonsCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to an affiliation change' ), ), ( '41422_valid_idp_with_indirectcrl_test22', 'ValidIDPwithindirectCRLTest22EE.crt', [ 'indirectCRLCA1Cert.crt', ], [ 'indirectCRLCA1CRL.crl', ], 3, True, None, None, ), ( '41423_invalid_idp_with_indirectcrl_test23', 'InvalidIDPwithindirectCRLTest23EE.crt', [ 'indirectCRLCA1Cert.crt', ], [ 'indirectCRLCA1CRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41424_valid_idp_with_indirectcrl_test24', 'ValidIDPwithindirectCRLTest24EE.crt', [ 'indirectCRLCA1Cert.crt', 'indirectCRLCA2Cert.crt', ], [ 'indirectCRLCA1CRL.crl', ], 3, True, None, None, ), ( '41425_valid_idp_with_indirectcrl_test25', 'ValidIDPwithindirectCRLTest25EE.crt', [ 'indirectCRLCA1Cert.crt', 'indirectCRLCA2Cert.crt', ], [ 'indirectCRLCA1CRL.crl', ], 3, True, None, None, ), ( '41426_invalid_idp_with_indirectcrl_test26', 'InvalidIDPwithindirectCRLTest26EE.crt', [ 'indirectCRLCA1Cert.crt', 'indirectCRLCA2Cert.crt', ], [ 'indirectCRLCA1CRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ), ), ( '41427_invalid_crlissuer_test27', 'InvalidcRLIssuerTest27EE.crt', [ 'GoodCACert.crt', 'indirectCRLCA2Cert.crt', ], [ 'GoodCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ), ), ( '41428_valid_crlissuer_test28', 'ValidcRLIssuerTest28EE.crt', [ 'indirectCRLCA3Cert.crt', 'indirectCRLCA3cRLIssuerCert.crt', ], [ 'indirectCRLCA3CRL.crl', 'indirectCRLCA3cRLIssuerCRL.crl', ], 3, True, None, None, ), ( '41429_valid_crlissuer_test29', 'ValidcRLIssuerTest29EE.crt', [ 'indirectCRLCA3Cert.crt', 'indirectCRLCA3cRLIssuerCert.crt', ], [ 'indirectCRLCA3CRL.crl', 'indirectCRLCA3cRLIssuerCRL.crl', ], 3, True, None, None, ), ( '41430_valid_crlissuer_test30', 'ValidcRLIssuerTest30EE.crt', [ 'indirectCRLCA4Cert.crt', 'indirectCRLCA4cRLIssuerCert.crt', ], [ 'indirectCRLCA4cRLIssuerCRL.crl', ], 3, True, None, None, ), ( '41431_invalid_crlissuer_test31', 'InvalidcRLIssuerTest31EE.crt', [ 'indirectCRLCA5Cert.crt', 'indirectCRLCA6Cert.crt', ], [ 'indirectCRLCA5CRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41432_invalid_crlissuer_test32', 'InvalidcRLIssuerTest32EE.crt', [ 'indirectCRLCA5Cert.crt', 'indirectCRLCA6Cert.crt', ], [ 'indirectCRLCA5CRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41433_valid_crlissuer_test33', 'ValidcRLIssuerTest33EE.crt', [ 'indirectCRLCA5Cert.crt', 'indirectCRLCA6Cert.crt', ], [ 'indirectCRLCA5CRL.crl', ], 3, True, None, None, ), ( '41434_invalid_crlissuer_test34', 'InvalidcRLIssuerTest34EE.crt', [ 'indirectCRLCA5Cert.crt', ], [ 'indirectCRLCA5CRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41435_invalid_crlissuer_test35', 'InvalidcRLIssuerTest35EE.crt', [ 'indirectCRLCA5Cert.crt', ], [ 'indirectCRLCA5CRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ), ), ( '41501_invalid_deltacrlindicator_no_base_set_test1', 'InvaliddeltaCRLIndicatorNoBaseTest1EE.crt', [ 'deltaCRLIndicatorNoBaseCACert.crt', ], [ 'deltaCRLIndicatorNoBaseCACRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because no revocation information ' 'could be found for the end-entity certificate' ), ), ( '41502_valid_deltacrl_test2', 'ValiddeltaCRLTest2EE.crt', [ 'deltaCRLCA1Cert.crt', ], [ 'deltaCRLCA1CRL.crl', 'deltaCRLCA1deltaCRL.crl', ], 3, True, None, None, ), ( '41503_invalid_deltacrl_test3', 'InvaliddeltaCRLTest3EE.crt', [ 'deltaCRLCA1Cert.crt', ], [ 'deltaCRLCA1CRL.crl', 'deltaCRLCA1deltaCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41504_invalid_deltacrl_test4', 'InvaliddeltaCRLTest4EE.crt', [ 'deltaCRLCA1Cert.crt', ], [ 'deltaCRLCA1CRL.crl', 'deltaCRLCA1deltaCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-06-01, due to a compromised key' ), ), ( '41505_valid_deltacrl_test5', 'ValiddeltaCRLTest5EE.crt', [ 'deltaCRLCA1Cert.crt', ], [ 'deltaCRLCA1CRL.crl', 'deltaCRLCA1deltaCRL.crl', ], 3, True, None, None, ), ( '41506_invalid_deltacrl_test6', 'InvaliddeltaCRLTest6EE.crt', [ 'deltaCRLCA1Cert.crt', ], [ 'deltaCRLCA1CRL.crl', 'deltaCRLCA1deltaCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41507_valid_deltacrl_test7', 'ValiddeltaCRLTest7EE.crt', [ 'deltaCRLCA1Cert.crt', ], [ 'deltaCRLCA1CRL.crl', 'deltaCRLCA1deltaCRL.crl', ], 3, True, None, None, ), ( '41508_valid_deltacrl_test8', 'ValiddeltaCRLTest8EE.crt', [ 'deltaCRLCA2Cert.crt', ], [ 'deltaCRLCA2CRL.crl', 'deltaCRLCA2deltaCRL.crl', ], 3, True, None, None, ), ( '41509_invalid_deltacrl_test9', 'InvaliddeltaCRLTest9EE.crt', [ 'deltaCRLCA2Cert.crt', ], [ 'deltaCRLCA2CRL.crl', 'deltaCRLCA2deltaCRL.crl', ], 3, True, RevokedError, ( 'CRL indicates the end-entity certificate was revoked at 08:30:00 ' 'on 2010-01-01, due to a compromised key' ), ), ( '41510_invalid_deltacrl_test10', 'InvaliddeltaCRLTest10EE.crt', [ 'deltaCRLCA3Cert.crt', ], [ 'deltaCRLCA3CRL.crl', 'deltaCRLCA3deltaCRL.crl', ], 3, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate revocation checks failed: CRL should have been ' 'regenerated by the validation time' ), ), ( '41601_valid_unknown_not_critical_certificate_extension_test1', 'ValidUnknownNotCriticalCertificateExtensionTest1EE.crt', [], [], 2, True, None, None ), ( '41602_invalid_unknown_critical_certificate_extension_test2', 'InvalidUnknownCriticalCertificateExtensionTest2EE.crt', [], [], 2, True, PathValidationError, ( 'The path could not be validated because the end-entity ' 'certificate contains the following unsupported critical ' 'extension: 2.16.840.1.101.2.1.12.2' ) ) ) certvalidator-0.11.1/tests/unittest_data.py000066400000000000000000000042551274666402600210440ustar00rootroot00000000000000# Written by Will Bond # # The author or authors of this code dedicate any and all copyright interest in # this code to the public domain. We make this dedication for the benefit of the # public at large and to the detriment of our heirs and successors. We intend # this dedication to be an overt act of relinquishment in perpetuity of all # present and future rights to this code under copyright law. def data(provider_method, first_param_name_suffix=False): """ A method decorator for unittest.TestCase classes that configured a static method to be used to provide multiple sets of test data to a single test :param provider_method: The name of the staticmethod of the class to use as the data provider :param first_param_name_suffix: If the first parameter for each set should be appended to the method name to generate the name of the test. Otherwise integers are used. :return: The decorated function """ def test_func_decorator(test_func): test_func._provider_method = provider_method test_func._provider_name_suffix = first_param_name_suffix return test_func return test_func_decorator def data_decorator(cls): """ A class decorator that works with the @provider decorator to generate test method from a data provider """ def generate_test_func(name, original_function, num, params): if original_function._provider_name_suffix: data_name = params[0] params = params[1:] else: data_name = num expanded_name = 'test_%s_%s' % (name, data_name) # We used expanded variable names here since this line is present in # backtraces that are generated from test failures. generated_test_function = lambda self: original_function(self, *params) setattr(cls, expanded_name, generated_test_function) for name in dir(cls): func = getattr(cls, name) if hasattr(func, '_provider_method'): num = 1 for params in getattr(cls, func._provider_method)(): generate_test_func(name, func, num, params) num += 1 return cls certvalidator-0.11.1/tox.ini000066400000000000000000000003261274666402600157660ustar00rootroot00000000000000[tox] envlist = py26,py27,py32,py33,py34,py35,pypy [testenv] deps = oscrypto asn1crypto flake8 commands = {envpython} run.py ci [pep8] max-line-length = 120 [flake8] max-line-length = 120 jobs = 1