openssl-extensions 1.1.0 → 1.2.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,8 @@
1
+ .bundle
2
+
3
+ .DS_Store
4
+ .*.swp
5
+ tmp
6
+ pkg
7
+ *.gem
8
+
data/.rspec ADDED
@@ -0,0 +1,2 @@
1
+ --format Fuubar
2
+ --color
data/.rvmrc ADDED
@@ -0,0 +1,2 @@
1
+ rvm_gemset_create_on_use_flag=1
2
+ rvm gemset use openssl-extensions
@@ -0,0 +1,15 @@
1
+ rvm:
2
+ - 1.8.7
3
+ - 1.9.2
4
+ - 1.9.3
5
+ - ree
6
+ - jruby
7
+ - rbx
8
+ gemfile:
9
+ - Gemfile
10
+ script: "bundle exec rspec spec/"
11
+ branches:
12
+ only:
13
+ - master
14
+ notifications:
15
+ email: false
@@ -1,6 +1,19 @@
1
+ ## 1.2.0, released 2011-11-03
2
+
3
+ [full changelog](http://github.com/envylabs/openssl-extensions/compare/v1.1.0...v1.2.0)
4
+
5
+ **Enhancements**
6
+
7
+ * Extended OpenSSL::BN to provide a #to_hex helper, a shortcut for to_s(16) \[[pyrat](https://github.com/pyrat)\]
8
+ * Extended OpenSSL::X509::Certificate, adding #authority_info_access and #crl_distribution_points methods \[[pyrat](https://github.com/pyrat)\]
9
+
1
10
  ## 1.1.0, released 2011-01-20
2
11
 
3
- * Extended OpenSSL::PKey::PKey to add equality methods.
12
+ [full changelog](http://github.com/envylabs/openssl-extensions/compare/v1.0.0...v1.1.0)
13
+
14
+ **Enhancements**
15
+
16
+ * Extended OpenSSL::PKey::PKey to add equality methods
4
17
 
5
18
  ## 1.0.0, released 2011-01-17
6
19
 
data/Gemfile ADDED
@@ -0,0 +1,2 @@
1
+ source "http://rubygems.org"
2
+ gemspec
@@ -0,0 +1,31 @@
1
+ PATH
2
+ remote: .
3
+ specs:
4
+ openssl-extensions (1.2.0)
5
+
6
+ GEM
7
+ remote: http://rubygems.org/
8
+ specs:
9
+ diff-lcs (1.1.2)
10
+ fuubar (0.0.3)
11
+ rspec (~> 2.0)
12
+ rspec-instafail (~> 0.1.4)
13
+ ruby-progressbar (~> 0.0.9)
14
+ rspec (2.4.0)
15
+ rspec-core (~> 2.4.0)
16
+ rspec-expectations (~> 2.4.0)
17
+ rspec-mocks (~> 2.4.0)
18
+ rspec-core (2.4.0)
19
+ rspec-expectations (2.4.0)
20
+ diff-lcs (~> 1.1.2)
21
+ rspec-instafail (0.1.5)
22
+ rspec-mocks (2.4.0)
23
+ ruby-progressbar (0.0.9)
24
+
25
+ PLATFORMS
26
+ ruby
27
+
28
+ DEPENDENCIES
29
+ fuubar (~> 0.0.1)
30
+ openssl-extensions!
31
+ rspec (~> 2.4.0)
data/README.md CHANGED
@@ -1,4 +1,4 @@
1
- # OpenSSL Extensions
1
+ # OpenSSL Extensions [![Build status][ci-image]][ci]
2
2
 
3
3
  This library generally provides helper methods which makes working with
4
4
  OpenSSL a little more bearable. It does, however, provide some additional
@@ -48,3 +48,6 @@ library:
48
48
  ## License
49
49
 
50
50
  Released under the MIT License. See the LICENSE file for further details.
51
+
52
+ [ci]: http://travis-ci.org/nbibler/openssl-extensions
53
+ [ci-image]: https://secure.travis-ci.org/nbibler/openssl-extensions.png
@@ -0,0 +1,9 @@
1
+ require 'rubygems'
2
+ require 'rake'
3
+ require 'rspec/core/rake_task'
4
+
5
+ task :default => :spec
6
+
7
+ RSpec::Core::RakeTask.new(:spec) do |t|
8
+ t.pattern = 'spec/**/*_spec.rb'
9
+ end
@@ -0,0 +1 @@
1
+ Autotest.add_discovery { "rspec2" }
@@ -7,3 +7,4 @@ require 'openssl-extensions/x509/certificate_chain'
7
7
  require 'openssl-extensions/x509/request'
8
8
  require 'openssl-extensions/x509/name'
9
9
  require 'openssl-extensions/ssl/ssl_socket'
10
+ require 'openssl-extensions/bn'
@@ -0,0 +1,15 @@
1
+ require 'openssl-extensions'
2
+
3
+ module OpenSSLExtensions
4
+ module BN
5
+ ##
6
+ # OpenSSL deals with serials in HEX format.
7
+ # This gives you the ability to get this hex serial if you need to work with
8
+ # certificate information directly with OpenSSL
9
+ def to_hex
10
+ to_s(16).upcase
11
+ end
12
+ end
13
+ end
14
+
15
+ OpenSSL::BN.send(:include, OpenSSLExtensions::BN)
@@ -5,12 +5,19 @@ require 'openssl-extensions/pkey'
5
5
  # Extends OpenSSL::PKey::PKey and its submodules with helper methods.
6
6
  #
7
7
  module OpenSSLExtensions::PKey::PKey
8
+ ##
9
+ # Equality is tested by comparing the instances' +hash+.
10
+ #
8
11
  def ==(other)
9
12
  other.kind_of?(OpenSSL::PKey::PKey) &&
10
13
  self.hash == other.hash
11
14
  end
12
15
  alias_method :eql?, :==
13
16
 
17
+ ##
18
+ # Override the default Object#hash to identify uniqueness of the key.
19
+ # This uses a hash of the PEM.
20
+ #
14
21
  def hash
15
22
  to_pem.hash
16
23
  end
@@ -1,3 +1,3 @@
1
1
  module OpenSSLExtensions
2
- Version = '1.1.0'
2
+ Version = '1.2.0'
3
3
  end
@@ -83,6 +83,16 @@ module OpenSSLExtensions::X509::Certificate
83
83
  def subject_key_identifier
84
84
  read_extension_by_oid('subjectKeyIdentifier')
85
85
  end
86
+
87
+ ##
88
+ # This can be used for getting OCSP Urls for revocation checks.
89
+ def authority_info_access
90
+ read_extension_by_oid('authorityInfoAccess')
91
+ end
92
+
93
+ def crl_distribution_points
94
+ read_extension_by_oid('crlDistributionPoints')
95
+ end
86
96
 
87
97
  ##
88
98
  # Returns the SSL version used by the certificate. Most likely, this
@@ -100,7 +110,7 @@ module OpenSSLExtensions::X509::Certificate
100
110
  $1.to_i
101
111
  end
102
112
  end
103
-
113
+
104
114
  end
105
115
 
106
116
  OpenSSL::X509::Certificate.send(:include, OpenSSLExtensions::X509::Certificate)
@@ -0,0 +1,25 @@
1
+ # -*- encoding: utf-8 -*-
2
+ lib = File.expand_path('../lib/', __FILE__)
3
+ $:.unshift lib unless $:.include?(lib)
4
+
5
+ require 'openssl-extensions/version'
6
+
7
+ Gem::Specification.new do |s|
8
+ s.name = 'openssl-extensions'
9
+ s.version = OpenSSLExtensions::Version
10
+ s.platform = Gem::Platform::RUBY
11
+ s.authors = ['Nathaniel Bibler']
12
+ s.email = ['nate@envylabs.com']
13
+ s.homepage = 'http://github.com/envylabs/openssl-extensions'
14
+ s.summary = 'Helper methods and extensions for OpenSSL to make the interface more intuitive.'
15
+ s.description = 'This library patches OpenSSL to add helper methods and extensions to OpenSSL objects with the intention of making the interface more intuitive.'
16
+ s.required_rubygems_version = '>= 1.3.6'
17
+
18
+ s.add_development_dependency 'rspec', '~> 2.4.0'
19
+ s.add_development_dependency 'fuubar', '~> 0.0.1'
20
+
21
+ s.files = `git ls-files`.split("\n")
22
+ s.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
23
+ s.executables = `git ls-files -- bin/*`.split("\n").map{ |f| File.basename(f) }
24
+ s.require_paths = ["lib"]
25
+ end
@@ -1,7 +1,8 @@
1
1
  require 'spec_helper'
2
2
 
3
3
  describe OpenSSLExtensions::X509::Certificate do
4
- subject { extended_ssl_certificates('www.geocerts.com') }
4
+ let(:certificate) { extended_ssl_certificates('www.geocerts.com') }
5
+ subject { certificate }
5
6
 
6
7
  its(:subject_alternative_names) { should == %w(www.geocerts.com geocerts.com) }
7
8
  its(:subject_key_identifier) { should be_nil }
@@ -9,33 +10,42 @@ describe OpenSSLExtensions::X509::Certificate do
9
10
  its(:ssl_version) { should == 3 }
10
11
 
11
12
  context 'strength' do
12
- it 'is 2048 bits' do
13
- subject.strength.should == 2048
13
+ subject { certificate.strength }
14
+
15
+ context 'for a 2048 bit certificate' do
16
+ it { should == 2048 }
14
17
  end
15
18
 
16
- it 'is 1024 bits' do
17
- extended_ssl_certificates('www.twongo.com').strength.should == 1024
19
+ context 'for a 1024 bit certificate' do
20
+ let(:certificate) { extended_ssl_certificates('www.twongo.com') }
21
+
22
+ it { should == 1024 }
18
23
  end
19
24
  end
20
25
 
21
26
  context 'allows_certificate_signing?' do
27
+ subject { certificate.allows_certificate_signing? }
28
+
22
29
  context 'for V3' do
23
- it 'is true for a root certificate' do
24
- extended_ssl_certificates('GeoTrust Primary Certification Authority').allows_certificate_signing?.should be_true
30
+ context 'for a root certificate' do
31
+ let(:certificate) { extended_ssl_certificates('GeoTrust Primary Certification Authority') }
32
+ it { should be_true }
25
33
  end
26
34
 
27
- it 'is false for a site certificate' do
28
- extended_ssl_certificates('www.geocerts.com').allows_certificate_signing?.should be_false
35
+ context 'for a site certificate' do
36
+ it { should be_false }
29
37
  end
30
38
  end
31
39
 
32
40
  context 'for V1' do
33
- it 'is true for a root certificate' do
34
- extended_ssl_certificates('HongKong Post Root CA 1').allows_certificate_signing?.should be_true
41
+ context 'for a root certificate' do
42
+ let(:certificate) { extended_ssl_certificates('HongKong Post Root CA 1') }
43
+ it { should be_true }
35
44
  end
36
45
 
37
- it 'is false for a site certificate' do
38
- extended_ssl_certificates('app1.hongkongpost.com').allows_certificate_signing?.should be_false
46
+ context 'for a site certificate' do
47
+ let(:certificate) { extended_ssl_certificates('app1.hongkongpost.com') }
48
+ it { should be_false }
39
49
  end
40
50
  end
41
51
  end
@@ -61,7 +71,8 @@ describe OpenSSLExtensions::X509::Certificate do
61
71
 
62
72
  context 'equality (==)' do
63
73
  it 'is true with matching PEMs' do
64
- ssl_certificates('www.geocerts.com').should == ssl_certificates('www.geocerts.com')
74
+ ssl_certificates('www.geocerts.com').
75
+ should == ssl_certificates('www.geocerts.com')
65
76
  end
66
77
 
67
78
  it 'is false with mismatched PEMs' do
@@ -81,16 +92,15 @@ describe OpenSSLExtensions::X509::Certificate do
81
92
  it 'does not modify non-duplicates' do
82
93
  [ssl_certificates('www.geocerts.com'),
83
94
  ssl_certificates('GeoTrust Extended Validation SSL CA')].uniq.should ==
84
- [ssl_certificates('www.geocerts.com'),
85
- ssl_certificates('GeoTrust Extended Validation SSL CA')]
95
+ [ssl_certificates('www.geocerts.com'),
96
+ ssl_certificates('GeoTrust Extended Validation SSL CA')]
86
97
  end
87
98
  end
88
99
 
89
- context 'when a subject key identifier is provided' do
100
+ context 'subject_key_identifier' do
101
+ subject { ssl_certificates('GeoTrust Extended Validation SSL CA').extend(OpenSSLExtensions::X509::Certificate).subject_key_identifier }
90
102
 
91
- subject { ssl_certificates('GeoTrust Extended Validation SSL CA').extend(OpenSSLExtensions::X509::Certificate) }
92
-
93
- its(:subject_key_identifier) { should == '28:C4:EB:8F:F1:5F:79:90:A3:2B:55:C3:56:4E:7D:6B:53:72:2C:18' }
103
+ it { should == '28:C4:EB:8F:F1:5F:79:90:A3:2B:55:C3:56:4E:7D:6B:53:72:2C:18' }
94
104
  end
95
105
 
96
106
  context 'root?' do
@@ -106,4 +116,27 @@ describe OpenSSLExtensions::X509::Certificate do
106
116
  extended_ssl_certificates('globalsign-root-ca').should be_root
107
117
  end
108
118
  end
119
+
120
+ context 'serial' do
121
+ context 'to_hex' do
122
+ let(:certificate) { extended_ssl_certificates('GeoTrust Extended Validation SSL CA') }
123
+ subject { certificate.serial.to_hex }
124
+
125
+ it 'returns the base 16 (hex) format of the serial number' do
126
+ should eq('6948A26B201AA421E898B1C492C7C58E')
127
+ end
128
+ end
129
+ end
130
+
131
+ context 'crl_distribution_points' do
132
+ subject { certificate.crl_distribution_points }
133
+
134
+ it { should == "URI:http://EVSSL-crl.geotrust.com/crls/gtextvalca.crl\n" }
135
+ end
136
+
137
+ context 'authority_info_access' do
138
+ subject { certificate.authority_info_access }
139
+
140
+ it { should == "OCSP - URI:http://EVSSL-ocsp.geotrust.com\nCA Issuers - URI:http://EVSSL-aia.geotrust.com/evca.crt\n" }
141
+ end
109
142
  end
@@ -0,0 +1,9 @@
1
+ require 'spec_helper'
2
+
3
+ describe OpenSSL::BN do
4
+ subject { ssl_certificates('www.geocerts.com').serial }
5
+
6
+ it "includes the OpenSSLExtensions::BN extensions" do
7
+ subject.should be_kind_of OpenSSLExtensions::BN
8
+ end
9
+ end
metadata CHANGED
@@ -1,87 +1,76 @@
1
- --- !ruby/object:Gem::Specification
1
+ --- !ruby/object:Gem::Specification
2
2
  name: openssl-extensions
3
- version: !ruby/object:Gem::Version
4
- hash: 19
5
- prerelease: false
6
- segments:
7
- - 1
8
- - 1
9
- - 0
10
- version: 1.1.0
3
+ version: !ruby/object:Gem::Version
4
+ version: 1.2.0
5
+ prerelease:
11
6
  platform: ruby
12
- authors:
7
+ authors:
13
8
  - Nathaniel Bibler
14
9
  autorequire:
15
10
  bindir: bin
16
11
  cert_chain: []
17
-
18
- date: 2011-01-20 00:00:00 -05:00
19
- default_executable:
20
- dependencies:
21
- - !ruby/object:Gem::Dependency
12
+ date: 2011-11-03 00:00:00.000000000Z
13
+ dependencies:
14
+ - !ruby/object:Gem::Dependency
22
15
  name: rspec
23
- prerelease: false
24
- requirement: &id001 !ruby/object:Gem::Requirement
16
+ requirement: &2152536060 !ruby/object:Gem::Requirement
25
17
  none: false
26
- requirements:
18
+ requirements:
27
19
  - - ~>
28
- - !ruby/object:Gem::Version
29
- hash: 31
30
- segments:
31
- - 2
32
- - 4
33
- - 0
20
+ - !ruby/object:Gem::Version
34
21
  version: 2.4.0
35
22
  type: :development
36
- version_requirements: *id001
37
- - !ruby/object:Gem::Dependency
38
- name: fuubar
39
23
  prerelease: false
40
- requirement: &id002 !ruby/object:Gem::Requirement
24
+ version_requirements: *2152536060
25
+ - !ruby/object:Gem::Dependency
26
+ name: fuubar
27
+ requirement: &2152563220 !ruby/object:Gem::Requirement
41
28
  none: false
42
- requirements:
29
+ requirements:
43
30
  - - ~>
44
- - !ruby/object:Gem::Version
45
- hash: 29
46
- segments:
47
- - 0
48
- - 0
49
- - 1
31
+ - !ruby/object:Gem::Version
50
32
  version: 0.0.1
51
33
  type: :development
52
- version_requirements: *id002
53
- description: This library patches OpenSSL to add helper methods and extensions to OpenSSL objects with the intention of making the interface more intuitive.
54
- email:
34
+ prerelease: false
35
+ version_requirements: *2152563220
36
+ description: This library patches OpenSSL to add helper methods and extensions to
37
+ OpenSSL objects with the intention of making the interface more intuitive.
38
+ email:
55
39
  - nate@envylabs.com
56
40
  executables: []
57
-
58
41
  extensions: []
59
-
60
42
  extra_rdoc_files: []
61
-
62
- files:
43
+ files:
44
+ - .gitignore
45
+ - .rspec
46
+ - .rvmrc
47
+ - .travis.yml
48
+ - CHANGELOG.md
49
+ - Gemfile
50
+ - Gemfile.lock
51
+ - LICENSE
52
+ - README.md
53
+ - Rakefile
54
+ - autotest/discover.rb
55
+ - lib/openssl-extensions.rb
63
56
  - lib/openssl-extensions/all.rb
64
- - lib/openssl-extensions/pkey/pkey.rb
57
+ - lib/openssl-extensions/bn.rb
65
58
  - lib/openssl-extensions/pkey.rb
66
- - lib/openssl-extensions/ssl/ssl_socket.rb
59
+ - lib/openssl-extensions/pkey/pkey.rb
67
60
  - lib/openssl-extensions/ssl.rb
61
+ - lib/openssl-extensions/ssl/ssl_socket.rb
68
62
  - lib/openssl-extensions/version.rb
63
+ - lib/openssl-extensions/x509.rb
69
64
  - lib/openssl-extensions/x509/authority_key_identifier.rb
70
65
  - lib/openssl-extensions/x509/certificate.rb
71
66
  - lib/openssl-extensions/x509/certificate_chain.rb
72
67
  - lib/openssl-extensions/x509/name.rb
73
68
  - lib/openssl-extensions/x509/request.rb
74
- - lib/openssl-extensions/x509.rb
75
- - lib/openssl-extensions.rb
76
- - CHANGELOG.md
77
- - LICENSE
78
- - README.md
69
+ - openssl-extensions.gemspec
79
70
  - spec/fixtures/certificate_requests/1024.csr
80
71
  - spec/fixtures/certificate_requests/challenge.csr
81
72
  - spec/fixtures/certificate_requests/envylabs.csr
82
73
  - spec/fixtures/certificate_requests/geocerts.csr
83
- - spec/fixtures/certificate_requests/geocerts.key
84
- - spec/fixtures/certificate_requests/geocerts_1024.key
85
74
  - spec/fixtures/certificate_requests/sans.csr
86
75
  - spec/fixtures/certificates/app1.hongkongpost.com.pem
87
76
  - spec/fixtures/certificates/equifax-secure-ca.pem
@@ -96,11 +85,6 @@ files:
96
85
  - spec/fixtures/certificates/www.twongo.com.pem
97
86
  - spec/fixtures/keys/dsa.key
98
87
  - spec/fixtures/keys/rsa.key
99
- - spec/integration/openssl/pkey/pkey_spec.rb
100
- - spec/integration/openssl/ssl/ssl_socket_spec.rb
101
- - spec/integration/openssl/x509/certificate_spec.rb
102
- - spec/integration/openssl/x509/name_spec.rb
103
- - spec/integration/openssl/x509/request_spec.rb
104
88
  - spec/models/openssl-extensions/pkey/pkey_spec.rb
105
89
  - spec/models/openssl-extensions/ssl/ssl_socket_spec.rb
106
90
  - spec/models/openssl-extensions/x509/authority_key_identifier_spec.rb
@@ -109,53 +93,45 @@ files:
109
93
  - spec/models/openssl-extensions/x509/name_spec.rb
110
94
  - spec/models/openssl-extensions/x509/request_spec.rb
111
95
  - spec/models/openssl-extensions_spec.rb
96
+ - spec/requests/openssl/bn_spec.rb
97
+ - spec/requests/openssl/pkey/pkey_spec.rb
98
+ - spec/requests/openssl/ssl/ssl_socket_spec.rb
99
+ - spec/requests/openssl/x509/certificate_spec.rb
100
+ - spec/requests/openssl/x509/name_spec.rb
101
+ - spec/requests/openssl/x509/request_spec.rb
112
102
  - spec/spec_helper.rb
113
103
  - spec/support/certificate_request_fixtures.rb
114
104
  - spec/support/pkey_fixtures.rb
115
105
  - spec/support/ssl_certificate_fixtures.rb
116
- has_rdoc: true
117
106
  homepage: http://github.com/envylabs/openssl-extensions
118
107
  licenses: []
119
-
120
108
  post_install_message:
121
109
  rdoc_options: []
122
-
123
- require_paths:
110
+ require_paths:
124
111
  - lib
125
- required_ruby_version: !ruby/object:Gem::Requirement
112
+ required_ruby_version: !ruby/object:Gem::Requirement
126
113
  none: false
127
- requirements:
128
- - - ">="
129
- - !ruby/object:Gem::Version
130
- hash: 3
131
- segments:
132
- - 0
133
- version: "0"
134
- required_rubygems_version: !ruby/object:Gem::Requirement
114
+ requirements:
115
+ - - ! '>='
116
+ - !ruby/object:Gem::Version
117
+ version: '0'
118
+ required_rubygems_version: !ruby/object:Gem::Requirement
135
119
  none: false
136
- requirements:
137
- - - ">="
138
- - !ruby/object:Gem::Version
139
- hash: 23
140
- segments:
141
- - 1
142
- - 3
143
- - 6
120
+ requirements:
121
+ - - ! '>='
122
+ - !ruby/object:Gem::Version
144
123
  version: 1.3.6
145
124
  requirements: []
146
-
147
125
  rubyforge_project:
148
- rubygems_version: 1.3.7
126
+ rubygems_version: 1.8.10
149
127
  signing_key:
150
128
  specification_version: 3
151
129
  summary: Helper methods and extensions for OpenSSL to make the interface more intuitive.
152
- test_files:
130
+ test_files:
153
131
  - spec/fixtures/certificate_requests/1024.csr
154
132
  - spec/fixtures/certificate_requests/challenge.csr
155
133
  - spec/fixtures/certificate_requests/envylabs.csr
156
134
  - spec/fixtures/certificate_requests/geocerts.csr
157
- - spec/fixtures/certificate_requests/geocerts.key
158
- - spec/fixtures/certificate_requests/geocerts_1024.key
159
135
  - spec/fixtures/certificate_requests/sans.csr
160
136
  - spec/fixtures/certificates/app1.hongkongpost.com.pem
161
137
  - spec/fixtures/certificates/equifax-secure-ca.pem
@@ -170,11 +146,6 @@ test_files:
170
146
  - spec/fixtures/certificates/www.twongo.com.pem
171
147
  - spec/fixtures/keys/dsa.key
172
148
  - spec/fixtures/keys/rsa.key
173
- - spec/integration/openssl/pkey/pkey_spec.rb
174
- - spec/integration/openssl/ssl/ssl_socket_spec.rb
175
- - spec/integration/openssl/x509/certificate_spec.rb
176
- - spec/integration/openssl/x509/name_spec.rb
177
- - spec/integration/openssl/x509/request_spec.rb
178
149
  - spec/models/openssl-extensions/pkey/pkey_spec.rb
179
150
  - spec/models/openssl-extensions/ssl/ssl_socket_spec.rb
180
151
  - spec/models/openssl-extensions/x509/authority_key_identifier_spec.rb
@@ -183,6 +154,12 @@ test_files:
183
154
  - spec/models/openssl-extensions/x509/name_spec.rb
184
155
  - spec/models/openssl-extensions/x509/request_spec.rb
185
156
  - spec/models/openssl-extensions_spec.rb
157
+ - spec/requests/openssl/bn_spec.rb
158
+ - spec/requests/openssl/pkey/pkey_spec.rb
159
+ - spec/requests/openssl/ssl/ssl_socket_spec.rb
160
+ - spec/requests/openssl/x509/certificate_spec.rb
161
+ - spec/requests/openssl/x509/name_spec.rb
162
+ - spec/requests/openssl/x509/request_spec.rb
186
163
  - spec/spec_helper.rb
187
164
  - spec/support/certificate_request_fixtures.rb
188
165
  - spec/support/pkey_fixtures.rb
@@ -1,27 +0,0 @@
1
- -----BEGIN RSA PRIVATE KEY-----
2
- MIIEogIBAAKCAQEAuXWzKA84WdxAhyOSsJgyh4Xa6UCItYcEanPL1NP5vAsDXyoG
3
- lKry49hRDGQkX6SQ+ER3NLYw7jjADn0eB9wIe3RRABRaHzaGTR4saFuRlBFahWq7
4
- WlRXtyGGM/3LO93GXbN/ZGqZVVzkP/4UhPge6mEs81mTmVAiuLanRrNnakt/6wJu
5
- Jg/leyaXtQ82RHE6Oge+h8LaEbHUtfx2Z8ooiwAr4hk4rAH3AqQfmWiEF+XDIEDI
6
- 0fBWcUCEXTxpfthojP6JuRC1PS1X9kk5P4ol3nSDlDl4YS4x6LF8OYhZyBMLxCat
7
- 9YueS7T8vx64+ilwhXevsqVVu84HHx1TDupLjwIDAQABAoIBAGXVvURX5ydgi4Yp
8
- AFk7mTNVSrkdmHOk6cXSQ7BfnRemLHnKx8ZGgAygMRDOxDJIWNoaLiKhkAie3MaX
9
- 6S+DoJy5Z+jVRA8zj1c1JElBTpSxWrU7wBh/i5KhM+HEkB4VTuEQuPjYl82JrkN9
10
- LqM84yzroxUUsLlUiVxH314xEK4KS4vzEte9Mf3YGO00OTcKRHig3J1en+5m56i/
11
- 3GsGjCogT8xTAPV+KSX6qU7GQ/1KE0soQzt2WlVQT7HwvcUhLn2C9l28Asn+mZaF
12
- 1aPsiEoFGPsBfDopWywST6dvxe4RHByLWEpjUUKhUMuv8Eqfd531+qPFnhrHn9QY
13
- aM5SFAECgYEA4VLDcDjALNNZEYN/hZHm9l/RJONHZ+CLAwpTHDdlwcejHL8gxTo0
14
- G8cEbgT0IyL6dIAC8aB/ne7Cb/Ua2AIklA04FJe2B4Q83ICmPFtHdoQq/ViGqVxM
15
- yvU/KY28A7UYIGYmoKFsONo//HIXED61iK7ChUDMUXcZpublOTEQFo8CgYEA0rWQ
16
- p1EebI7cZqQzSs2wueTKDDswIRnIoX9x8O0Ar1HkzoJ2JOAW999UZ8x8jeQhRNQX
17
- NZ/r+ixWvzzVPQva+SxgQqx4dB08NJGgdEOkYqzl3bRnR2q2I+nyNDYU8elxIvUd
18
- 95OGOQZGd12oLUKBG3YIb8Oc4Hfwz5/7ACqE+wECgYBfF1iXobuor0ElnQNSUXLR
19
- gzp2gNx/wEmqbM8KV27ASwpRdW/VDG01U9ZQwBJwSbC9PdEAPCXfdwXjzeMYSj85
20
- pCKIvkX6AhrVTA3b5wHPyJOD+7pI+0UFWl7foIs6XVDjS3j9zWIo1CKw3U1Sc8SU
21
- /HvnVKNltgfDYipW6pfJjQKBgBajPRxMwckF/DXm1D/oI2GFbBOuVDhqLbz0FUi+
22
- HcG4Oa3aJFlH3g/ZZZcVSBhydwSPCMNRICgrlVJMddhuKqN0mg7vuq026t32+1ci
23
- YUncq4GLPUFV/KWVH9luKgfnfak0znhn2BbOTsnKPSRHrdlGcBeZ24PePvf/hxb4
24
- ensBAoGANyQfL6E4RcBHQWZ1d2wq+Gd/mFctLrHWaJwdYd0dxd7oQ5zhue7+yPfD
25
- q5dosxjGs7ZEF5HbMwf5Iv0RAkb/W4BKja/tC6PIplpCTt59COlGdnLyHJeoRmF6
26
- KnSai8jcXz2SWdOMQWgHSSdfWqxosIf3wAIwbtY7wNv1t+1JguE=
27
- -----END RSA PRIVATE KEY-----
@@ -1,15 +0,0 @@
1
- -----BEGIN RSA PRIVATE KEY-----
2
- MIICXQIBAAKBgQDdlqVkMMohJ1kUqBxqZJojCFtJFht7f4JDs5kURI7QSCpN6eB/
3
- KLqP4x8skx3FGktU/Vgsdri9OeLS71cyw389eJyxmDFroicE0pyAd2o6dZGh1x9/
4
- 7AJuIDwolhyNAhHLtKppTRh1LIUoU2ZU9xuywN9QzI5Yj29pNBaszsbEJwIDAQAB
5
- AoGBALm8LTPW5YZ2qedzpiXT35MfzQxs+GpDDdhbsSNY9/BDnRojwKY1aHN1J8tA
6
- IUL2cFBz7rWOaflKjQLL1WZakcpQW9msIemPF0gKD5cNJrMuPcHZEu5vpPOXcTtR
7
- N4VxW5+U/PYU5J69j6q800z/Z0rWl+YtLnKc8ZbIIbFX1DBhAkEA9U4WR9QokPDf
8
- IPjDJOZkBVvvLLfnCx8RkcTmrJslfJ/5VrFLCVHMw1oaZuDOJVIG8bvMElcQR3/E
9
- qUHCw90V9wJBAOc/2i9gY/Mimzfs9xBNv+NFXEoJdoVHw9NAZgDi9otHZmfQHzYh
10
- 3DCQLzptJSp4cArVL5SB1mlLBFpmhBkLd1ECQAzjHFKLt9HdhatixkXDANAzQz5z
11
- LuUrra2dzYyV3gNNGDlQuSN1M6+zpR1whAP76jd66T6xaj6HXNqThNrrW4MCQDAI
12
- rlx67Cf7vzwdp7AmRj6CEMp8Lrc+kemWjdmPS2Dg4t+bdnA7Fk6sFHNRao/o1nUZ
13
- lTmGwq+6WlwgwT2miRECQQDrfnkHnjQP3yWtuwzx8/LeMSZ6rfMmQAAWUnF6FoRg
14
- /v7SVDx353vmj8k+ulQoyP6RKCnKZf4dGPRWCgpetdRk
15
- -----END RSA PRIVATE KEY-----