couchbase 4.4.0 → 4.4.1-dev.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/deps/couchbase-cxx-cache/mozilla-ca-bundle.crt +19 -32
- package/deps/couchbase-cxx-cache/mozilla-ca-bundle.sha256 +1 -1
- package/package.json +8 -7
- package/scripts/prebuilds.js +6 -5
- package/deps/couchbase-cxx-cache/asio/41f31469d0dd420500b334dc8c2fd3ffe7320d8e/asio/asio/COPYING +0 -4
- package/deps/couchbase-cxx-cache/asio/41f31469d0dd420500b334dc8c2fd3ffe7320d8e/asio/asio/README +0 -4
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/crypto/obj/README +0 -15
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/crypto/perlasm/readme +0 -100
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/pki/testdata/nist-pkits/README.chromium +0 -19
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/pki/testdata/ssl/certificates/README +0 -318
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/pki/testdata/verify_certificate_chain_unittest/README +0 -87
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/pki/testdata/verify_signed_data_unittest/README +0 -35
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/third_party/fiat/README.chromium +0 -11
- package/deps/couchbase-cxx-cache/boringssl/e31ea00c1ea52052d2d78d44006cc88c80fa24a9/boringssl/src/util/bot/README +0 -3
- package/deps/couchbase-cxx-cache/fmt/d3c862243fcf1c41b4c09903f35479bd42f135b7/fmt/support/README +0 -4
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
##
|
|
2
2
|
## Bundle of CA Root Certificates
|
|
3
3
|
##
|
|
4
|
-
## Certificate data from Mozilla as of:
|
|
4
|
+
## Certificate data from Mozilla as of: Tue Jul 2 03:12:04 2024 GMT
|
|
5
5
|
##
|
|
6
6
|
## This is a bundle of X.509 certificates of public Certificate Authorities
|
|
7
7
|
## (CA). These were automatically extracted from Mozilla's root certificates
|
|
@@ -14,7 +14,7 @@
|
|
|
14
14
|
## Just configure this file as the SSLCACertificateFile.
|
|
15
15
|
##
|
|
16
16
|
## Conversion done with mk-ca-bundle.pl version 1.29.
|
|
17
|
-
## SHA256:
|
|
17
|
+
## SHA256: 456ff095dde6dd73354c5c28c73d9c06f53b61a803963414cb91a1d92945cdd3
|
|
18
18
|
##
|
|
19
19
|
|
|
20
20
|
|
|
@@ -2600,36 +2600,6 @@ vLtoURMMA/cVi4RguYv/Uo7njLwcAjA8+RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+
|
|
|
2600
2600
|
CAezNIm8BZ/3Hobui3A=
|
|
2601
2601
|
-----END CERTIFICATE-----
|
|
2602
2602
|
|
|
2603
|
-
GLOBALTRUST 2020
|
|
2604
|
-
================
|
|
2605
|
-
-----BEGIN CERTIFICATE-----
|
|
2606
|
-
MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkGA1UEBhMCQVQx
|
|
2607
|
-
IzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVT
|
|
2608
|
-
VCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYxMDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAh
|
|
2609
|
-
BgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAy
|
|
2610
|
-
MDIwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWi
|
|
2611
|
-
D59bRatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9ZYybNpyrO
|
|
2612
|
-
VPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3QWPKzv9pj2gOlTblzLmM
|
|
2613
|
-
CcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPwyJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCm
|
|
2614
|
-
fecqQjuCgGOlYx8ZzHyyZqjC0203b+J+BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKA
|
|
2615
|
-
A1GqtH6qRNdDYfOiaxaJSaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9OR
|
|
2616
|
-
JitHHmkHr96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj04KlG
|
|
2617
|
-
DfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9MedKZssCz3AwyIDMvU
|
|
2618
|
-
clOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIwq7ejMZdnrY8XD2zHc+0klGvIg5rQ
|
|
2619
|
-
mjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUw
|
|
2620
|
-
AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1Ud
|
|
2621
|
-
IwQYMBaAFNwuH9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA
|
|
2622
|
-
VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJCXtzoRlgHNQIw
|
|
2623
|
-
4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd6IwPS3BD0IL/qMy/pJTAvoe9
|
|
2624
|
-
iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf+I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS
|
|
2625
|
-
8cE54+X1+NZK3TTN+2/BT+MAi1bikvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2
|
|
2626
|
-
HcqtbepBEX4tdJP7wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxS
|
|
2627
|
-
vTOBTI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6CMUO+1918
|
|
2628
|
-
oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn4rnvyOL2NSl6dPrFf4IF
|
|
2629
|
-
YqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+IaFvowdlxfv1k7/9nR4hYJS8+hge9+6jl
|
|
2630
|
-
gqispdNpQ80xiEmEU5LAsTkbOYMBMMTyqfrQA71yN2BWHzZ8vTmR9W0Nv3vXkg==
|
|
2631
|
-
-----END CERTIFICATE-----
|
|
2632
|
-
|
|
2633
2603
|
ANF Secure Server Root CA
|
|
2634
2604
|
=========================
|
|
2635
2605
|
-----BEGIN CERTIFICATE-----
|
|
@@ -3579,3 +3549,20 @@ wPfc5+pbrrLMtTWGS9DiP7bY+A4A7l3j941Y/8+LN+ljX273CXE2whJdV/LItM3z7gLfEdxquVeE
|
|
|
3579
3549
|
HVlNjM7IDiPCtyaaEBRx/pOyiriA8A4QntOoUAw3gi/q4Iqd4Sw5/7W0cwDk90imc6y/st53BIe0
|
|
3580
3550
|
o82bNSQ3+pCTE4FCxpgmdTdmQRCsu/WU48IxK63nI1bMNSWSs1A=
|
|
3581
3551
|
-----END CERTIFICATE-----
|
|
3552
|
+
|
|
3553
|
+
FIRMAPROFESIONAL CA ROOT-A WEB
|
|
3554
|
+
==============================
|
|
3555
|
+
-----BEGIN CERTIFICATE-----
|
|
3556
|
+
MIICejCCAgCgAwIBAgIQMZch7a+JQn81QYehZ1ZMbTAKBggqhkjOPQQDAzBuMQswCQYDVQQGEwJF
|
|
3557
|
+
UzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UEYQwPVkFURVMtQTYyNjM0MDY4
|
|
3558
|
+
MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENBIFJPT1QtQSBXRUIwHhcNMjIwNDA2MDkwMTM2
|
|
3559
|
+
WhcNNDcwMzMxMDkwMTM2WjBuMQswCQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25h
|
|
3560
|
+
bCBTQTEYMBYGA1UEYQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFM
|
|
3561
|
+
IENBIFJPT1QtQSBXRUIwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARHU+osEaR3xyrq89Zfe9MEkVz6
|
|
3562
|
+
iMYiuYMQYneEMy3pA4jU4DP37XcsSmDq5G+tbbT4TIqk5B/K6k84Si6CcyvHZpsKjECcfIr28jlg
|
|
3563
|
+
st7L7Ljkb+qbXbdTkBgyVcUgt5SjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUk+FD
|
|
3564
|
+
Y1w8ndYn81LsF7Kpryz3dvgwHQYDVR0OBBYEFJPhQ2NcPJ3WJ/NS7Beyqa8s93b4MA4GA1UdDwEB
|
|
3565
|
+
/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjAdfKR7w4l1M+E7qUW/Runpod3JIha3RxEL2Jq68cgL
|
|
3566
|
+
cFBTApFwhVmpHqTm6iMxoAACMQD94vizrxa5HnPEluPBMBnYfubDl94cT7iJLzPrSA8Z94dGXSaQ
|
|
3567
|
+
pYXFuXqUPoeovQA=
|
|
3568
|
+
-----END CERTIFICATE-----
|
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
1bf458412568e134a4514f5e170a328d11091e071c7110955c9884ed87972ac9 cacert.pem
|
package/package.json
CHANGED
|
@@ -54,7 +54,7 @@
|
|
|
54
54
|
"type": "git",
|
|
55
55
|
"url": "http://github.com/couchbase/couchnode.git"
|
|
56
56
|
},
|
|
57
|
-
"version": "4.4.
|
|
57
|
+
"version": "4.4.1-dev.2",
|
|
58
58
|
"config": {
|
|
59
59
|
"native": false
|
|
60
60
|
},
|
|
@@ -79,12 +79,13 @@
|
|
|
79
79
|
]
|
|
80
80
|
},
|
|
81
81
|
"optionalDependencies": {
|
|
82
|
-
"@couchbase/couchbase-darwin-arm64-napi": "4.4.
|
|
83
|
-
"@couchbase/couchbase-darwin-x64-napi": "4.4.
|
|
84
|
-
"@couchbase/couchbase-linux-arm64-napi": "4.4.
|
|
85
|
-
"@couchbase/couchbase-linuxmusl-
|
|
86
|
-
"@couchbase/couchbase-
|
|
87
|
-
"@couchbase/couchbase-
|
|
82
|
+
"@couchbase/couchbase-darwin-arm64-napi": "4.4.1-dev.2",
|
|
83
|
+
"@couchbase/couchbase-darwin-x64-napi": "4.4.1-dev.2",
|
|
84
|
+
"@couchbase/couchbase-linux-arm64-napi": "4.4.1-dev.2",
|
|
85
|
+
"@couchbase/couchbase-linuxmusl-arm64-napi": "4.4.1-dev.2",
|
|
86
|
+
"@couchbase/couchbase-linuxmusl-x64-napi": "4.4.1-dev.2",
|
|
87
|
+
"@couchbase/couchbase-linux-x64-napi": "4.4.1-dev.2",
|
|
88
|
+
"@couchbase/couchbase-win32-x64-napi": "4.4.1-dev.2"
|
|
88
89
|
},
|
|
89
90
|
"files": [
|
|
90
91
|
"LICENSE",
|
package/scripts/prebuilds.js
CHANGED
|
@@ -304,7 +304,8 @@ function getSupportedPlatformPackages(packageName) {
|
|
|
304
304
|
supportedPlatforms.forEach((plat) => {
|
|
305
305
|
supportedArches.forEach((arch) => {
|
|
306
306
|
// we don't support Windows or linuxmusl ARM atm
|
|
307
|
-
|
|
307
|
+
// UPDATE 07/2024: JSCBC-1268 adds linuxmusl + ARM support
|
|
308
|
+
if (plat === 'win32' && arch === 'arm64') return
|
|
308
309
|
allowedRuntimes.forEach((rt) => {
|
|
309
310
|
packageNames.push(`${packageName}-${plat}-${arch}-${rt}`)
|
|
310
311
|
})
|
|
@@ -342,8 +343,8 @@ function matchingPlatformPrebuild(filename, useElectronRuntime = false) {
|
|
|
342
343
|
const _runtime = useElectronRuntime
|
|
343
344
|
? 'electron'
|
|
344
345
|
: runtime === 'node'
|
|
345
|
-
|
|
346
|
-
|
|
346
|
+
? 'napi'
|
|
347
|
+
: runtime
|
|
347
348
|
const tokens = filename.split('-')
|
|
348
349
|
// filename format:
|
|
349
350
|
// couchbase-v<pkg-version>-<runtime>-v<runtime-version>-<platform>-<arch>-<ssl-type>.node
|
|
@@ -401,8 +402,8 @@ function resolvePrebuild(
|
|
|
401
402
|
const _runtime = useElectronRuntime
|
|
402
403
|
? 'electron'
|
|
403
404
|
: runtime === 'node'
|
|
404
|
-
|
|
405
|
-
|
|
405
|
+
? 'napi'
|
|
406
|
+
: runtime
|
|
406
407
|
try {
|
|
407
408
|
const localPrebuild = getLocalPrebuild(dir)
|
|
408
409
|
if (localPrebuild) {
|
|
@@ -1,15 +0,0 @@
|
|
|
1
|
-
The files nid.h, obj_mac.num, and obj_dat.h are generated from objects.txt and
|
|
2
|
-
obj_mac.num. To regenerate them, run:
|
|
3
|
-
|
|
4
|
-
go run objects.go
|
|
5
|
-
|
|
6
|
-
objects.txt contains the list of all built-in OIDs. It is processed by
|
|
7
|
-
objects.go to output obj_mac.num, obj_dat.h, and nid.h.
|
|
8
|
-
|
|
9
|
-
obj_mac.num is the list of NID values for each OID. This is an input/output
|
|
10
|
-
file so NID values are stable across regenerations.
|
|
11
|
-
|
|
12
|
-
nid.h is the header which defines macros for all the built-in OIDs in C.
|
|
13
|
-
|
|
14
|
-
obj_dat.h contains the ASN1_OBJECTs corresponding to built-in OIDs themselves
|
|
15
|
-
along with lookup tables for search by short name, OID, etc.
|
|
@@ -1,100 +0,0 @@
|
|
|
1
|
-
The perl scripts in this directory are my 'hack' to generate
|
|
2
|
-
multiple different assembler formats via the one origional script.
|
|
3
|
-
|
|
4
|
-
The way to use this library is to start with adding the path to this directory
|
|
5
|
-
and then include it.
|
|
6
|
-
|
|
7
|
-
push(@INC,"perlasm","../../perlasm");
|
|
8
|
-
require "x86asm.pl";
|
|
9
|
-
|
|
10
|
-
The first thing we do is setup the file and type of assembler
|
|
11
|
-
|
|
12
|
-
&asm_init($ARGV[0]);
|
|
13
|
-
|
|
14
|
-
The first argument is the 'type'. Currently
|
|
15
|
-
'cpp', 'sol', 'a.out', 'elf' or 'win32'.
|
|
16
|
-
Argument 2 is the file name.
|
|
17
|
-
|
|
18
|
-
The reciprocal function is
|
|
19
|
-
&asm_finish() which should be called at the end.
|
|
20
|
-
|
|
21
|
-
There are 2 main 'packages'. x86ms.pl, which is the Microsoft assembler,
|
|
22
|
-
and x86unix.pl which is the unix (gas) version.
|
|
23
|
-
|
|
24
|
-
Functions of interest are:
|
|
25
|
-
&external_label("des_SPtrans"); declare and external variable
|
|
26
|
-
&LB(reg); Low byte for a register
|
|
27
|
-
&HB(reg); High byte for a register
|
|
28
|
-
&BP(off,base,index,scale) Byte pointer addressing
|
|
29
|
-
&DWP(off,base,index,scale) Word pointer addressing
|
|
30
|
-
&stack_push(num) Basically a 'sub esp, num*4' with extra
|
|
31
|
-
&stack_pop(num) inverse of stack_push
|
|
32
|
-
&function_begin(name,extra) Start a function with pushing of
|
|
33
|
-
edi, esi, ebx and ebp. extra is extra win32
|
|
34
|
-
external info that may be required.
|
|
35
|
-
&function_begin_B(name,extra) Same as normal function_begin but no pushing.
|
|
36
|
-
&function_end(name) Call at end of function.
|
|
37
|
-
&function_end_A(name) Standard pop and ret, for use inside functions
|
|
38
|
-
&function_end_B(name) Call at end but with poping or 'ret'.
|
|
39
|
-
&swtmp(num) Address on stack temp word.
|
|
40
|
-
&wparam(num) Parameter number num, that was push
|
|
41
|
-
in C convention. This all works over pushes
|
|
42
|
-
and pops.
|
|
43
|
-
&comment("hello there") Put in a comment.
|
|
44
|
-
&label("loop") Refer to a label, normally a jmp target.
|
|
45
|
-
&set_label("loop") Set a label at this point.
|
|
46
|
-
&data_word(word) Put in a word of data.
|
|
47
|
-
|
|
48
|
-
So how does this all hold together? Given
|
|
49
|
-
|
|
50
|
-
int calc(int len, int *data)
|
|
51
|
-
{
|
|
52
|
-
int i,j=0;
|
|
53
|
-
|
|
54
|
-
for (i=0; i<len; i++)
|
|
55
|
-
{
|
|
56
|
-
j+=other(data[i]);
|
|
57
|
-
}
|
|
58
|
-
}
|
|
59
|
-
|
|
60
|
-
So a very simple version of this function could be coded as
|
|
61
|
-
|
|
62
|
-
push(@INC,"perlasm","../../perlasm");
|
|
63
|
-
require "x86asm.pl";
|
|
64
|
-
|
|
65
|
-
&asm_init($ARGV[0]);
|
|
66
|
-
|
|
67
|
-
&external_label("other");
|
|
68
|
-
|
|
69
|
-
$tmp1= "eax";
|
|
70
|
-
$j= "edi";
|
|
71
|
-
$data= "esi";
|
|
72
|
-
$i= "ebp";
|
|
73
|
-
|
|
74
|
-
&comment("a simple function");
|
|
75
|
-
&function_begin("calc");
|
|
76
|
-
&mov( $data, &wparam(1)); # data
|
|
77
|
-
&xor( $j, $j);
|
|
78
|
-
&xor( $i, $i);
|
|
79
|
-
|
|
80
|
-
&set_label("loop");
|
|
81
|
-
&cmp( $i, &wparam(0));
|
|
82
|
-
&jge( &label("end"));
|
|
83
|
-
|
|
84
|
-
&mov( $tmp1, &DWP(0,$data,$i,4));
|
|
85
|
-
&push( $tmp1);
|
|
86
|
-
&call( "other");
|
|
87
|
-
&add( $j, "eax");
|
|
88
|
-
&pop( $tmp1);
|
|
89
|
-
&inc( $i);
|
|
90
|
-
&jmp( &label("loop"));
|
|
91
|
-
|
|
92
|
-
&set_label("end");
|
|
93
|
-
&mov( "eax", $j);
|
|
94
|
-
|
|
95
|
-
&function_end("calc");
|
|
96
|
-
|
|
97
|
-
&asm_finish();
|
|
98
|
-
|
|
99
|
-
The above example is very very unoptimised but gives an idea of how
|
|
100
|
-
things work.
|
|
@@ -1,19 +0,0 @@
|
|
|
1
|
-
Name: NIST Public Key Interoperability Test Suite
|
|
2
|
-
Short Name: NIST PKITS
|
|
3
|
-
URL: http://csrc.nist.gov/groups/ST/crypto_apps_infra/pki/pkitesting.html
|
|
4
|
-
Version: 1.0.1
|
|
5
|
-
Date: April 14, 2011
|
|
6
|
-
License: Public Domain: United States Government Work under 17 U.S.C. 105
|
|
7
|
-
Shipped: no
|
|
8
|
-
|
|
9
|
-
Description:
|
|
10
|
-
The Public Key Interoperability Test Suite (PKITS) is a comprehensive X.509
|
|
11
|
-
path validation test suite that was developed by NIST in conjunction with BAE
|
|
12
|
-
Systems and NSA. The PKITS path validation test suite is designed to cover
|
|
13
|
-
most of the features specified in X.509 and RFC 3280.
|
|
14
|
-
|
|
15
|
-
Local Modifications:
|
|
16
|
-
Only the certs/ and crls/ directories were extracted from PKITS_data.zip.
|
|
17
|
-
|
|
18
|
-
pkits_testcases-inl.h is generated from the test descriptions in PKITS.pdf
|
|
19
|
-
using generate_tests.py.
|
|
@@ -1,318 +0,0 @@
|
|
|
1
|
-
This directory contains various certificates for use with SSL-related
|
|
2
|
-
unit tests.
|
|
3
|
-
|
|
4
|
-
===== Real-world certificates that need manual updating
|
|
5
|
-
- google.binary.p7b
|
|
6
|
-
- google.chain.pem
|
|
7
|
-
- google.pem_cert.p7b
|
|
8
|
-
- google.pem_pkcs7.p7b
|
|
9
|
-
- google.pkcs7.p7b
|
|
10
|
-
- google.single.der
|
|
11
|
-
- google.single.pem : Certificates for testing parsing of different formats.
|
|
12
|
-
|
|
13
|
-
- mit.davidben.der : An expired MIT client certificate.
|
|
14
|
-
|
|
15
|
-
- foaf.me.chromium-test-cert.der : A client certificate for a FOAF.ME identity
|
|
16
|
-
created for testing.
|
|
17
|
-
|
|
18
|
-
- google_diginotar.pem
|
|
19
|
-
- diginotar_public_ca_2025.pem : A certificate chain for the regression test
|
|
20
|
-
of http://crbug.com/94673
|
|
21
|
-
|
|
22
|
-
- salesforce_com_test.pem
|
|
23
|
-
- verisign_intermediate_ca_2011.pem
|
|
24
|
-
- verisign_intermediate_ca_2016.pem : Certificates for testing two
|
|
25
|
-
X509Certificate objects that contain the same server certificate but
|
|
26
|
-
different intermediate CA certificates. The two intermediate CA
|
|
27
|
-
certificates actually represent the same intermediate CA but have
|
|
28
|
-
different validity periods.
|
|
29
|
-
|
|
30
|
-
- ndn.ca.crt: "New Dream Network Certificate Authority" root certificate.
|
|
31
|
-
This is an X.509 v1 certificate that omits the version field. Used to
|
|
32
|
-
test that the certificate version gets the default value v1.
|
|
33
|
-
|
|
34
|
-
- ct-test-embedded-cert.pem
|
|
35
|
-
- ct-test-embedded-with-intermediate-chain.pem
|
|
36
|
-
- ct-test-embedded-with-intermediate-preca-chain.pem
|
|
37
|
-
- ct-test-embedded-with-preca-chain.pem
|
|
38
|
-
Test certificate chains for Certificate Transparency: Each of these
|
|
39
|
-
files contains a leaf certificate as the first certificate, which has
|
|
40
|
-
embedded SCTs, followed by the issuer certificates chain.
|
|
41
|
-
All files are from the src/test/testdada directory in
|
|
42
|
-
https://code.google.com/p/certificate-transparency/
|
|
43
|
-
|
|
44
|
-
- leaf_from_known_root.pem : A certificate issued by a public trust anchor,
|
|
45
|
-
used for CertVerifyProcInternalTest.TestKnownRoot. Using for other
|
|
46
|
-
purposes is not recommended. This needs to be updated periodically so the
|
|
47
|
-
server name the cert is valid for may change.
|
|
48
|
-
|
|
49
|
-
- lets-encrypt-dst-x3-root.pem: A chain that ends in the Lets encrypt DST X3
|
|
50
|
-
root (https://crt.sh/?id=8395). Has the same leaf as
|
|
51
|
-
lets-encrypt-isrg-x1-root.pem.
|
|
52
|
-
- lets-encrypt-isrg-x1-root.pem: A chain that ends in the Lets encrypt ISRG X1
|
|
53
|
-
root (https://crt.sh/?id=9314791). Has the same leaf as
|
|
54
|
-
lets-encrypt-dst-x3-root.pem.
|
|
55
|
-
|
|
56
|
-
===== Manually generated certificates
|
|
57
|
-
- client.p12 : A PKCS #12 file containing a client certificate and a private
|
|
58
|
-
key created for testing. The password is "12345".
|
|
59
|
-
|
|
60
|
-
- client-nokey.p12 : A PKCS #12 file containing a client certificate (the same
|
|
61
|
-
as the one in client.p12) but no private key. The password is "12345".
|
|
62
|
-
|
|
63
|
-
- client-empty-password.p12 : A PKCS #12 file containing an unencrypted client
|
|
64
|
-
certificate and a encrypted private key. The password is the empty string,
|
|
65
|
-
encoded as two zero bytes. (PKCS#12 passwords are encoded as
|
|
66
|
-
NUL-terminated UTF-16.)
|
|
67
|
-
|
|
68
|
-
- client-null-password.p12 : A PKCS #12 file containing an unencrypted client
|
|
69
|
-
certificate and a encrypted private key. The password is the empty string,
|
|
70
|
-
encoded as the empty byte string.
|
|
71
|
-
|
|
72
|
-
- unittest.selfsigned.der : A self-signed certificate generated using private
|
|
73
|
-
key in unittest.key.bin. The common name is "unittest".
|
|
74
|
-
|
|
75
|
-
- unittest.key.bin : private key stored unencrypted.
|
|
76
|
-
|
|
77
|
-
- multivalue_rdn.pem : A regression test for http://crbug.com/101009. A
|
|
78
|
-
certificate with all of the AttributeTypeAndValues stored within a single
|
|
79
|
-
RelativeDistinguishedName, rather than one AVA per RDN as normally seen.
|
|
80
|
-
|
|
81
|
-
- unescaped.pem : Regression test for http://crbug.com/102839. Contains
|
|
82
|
-
characters such as '=' and '"' that would normally be escaped when
|
|
83
|
-
converting a subject/issuer name to their stringized form.
|
|
84
|
-
|
|
85
|
-
- websocket_cacert.pem : The testing root CA for testing WebSocket client
|
|
86
|
-
certificate authentication.
|
|
87
|
-
This file is used in SSLUITest.TestWSSClientCert.
|
|
88
|
-
|
|
89
|
-
- websocket_client_cert.p12 : A PKCS #12 file containing a client certificate
|
|
90
|
-
and a private key created for WebSocket testing. The password is "".
|
|
91
|
-
This file is used in SSLUITest.TestWSSClientCert.
|
|
92
|
-
|
|
93
|
-
- no_subject_common_name_cert.pem: Used to test the function that generates a
|
|
94
|
-
NSS certificate nickname for a user certificate. This certificate's Subject
|
|
95
|
-
field doesn't have a common name.
|
|
96
|
-
|
|
97
|
-
- ct-test-embedded-with-uids.pem: A certificate with embedded SCT and
|
|
98
|
-
issuer/subject unique IDs. This certificate should only be used in parsing
|
|
99
|
-
tests and otherwise kept fixed. The signature, etc., are intentionally
|
|
100
|
-
invalid.
|
|
101
|
-
|
|
102
|
-
- name_constrained_key.pem
|
|
103
|
-
The private key matching the public_key_hash of the kDomainsTest constraint
|
|
104
|
-
in CertVerifyProc::HasNameConstraintsViolation.
|
|
105
|
-
|
|
106
|
-
===== From net/data/ssl/scripts/generate-quic-chain.sh
|
|
107
|
-
- quic-chain.pem
|
|
108
|
-
- quic-leaf-cert.key
|
|
109
|
-
- quic-leaf-cert.key.pkcs8.pem
|
|
110
|
-
- quic-root.pem
|
|
111
|
-
These certificates are used by integration tests that use QUIC.
|
|
112
|
-
|
|
113
|
-
- quic-leaf-cert.key.sct
|
|
114
|
-
This isn't generated and just contains a simple text file (the contents
|
|
115
|
-
don't actually matter, just the presence of the file).
|
|
116
|
-
|
|
117
|
-
===== From net/data/ssl/scripts/generate-test-certs.sh
|
|
118
|
-
- expired_cert.pem
|
|
119
|
-
- ok_cert.pem
|
|
120
|
-
- root_ca_cert.pem
|
|
121
|
-
These certificates are the common certificates used by the Python test
|
|
122
|
-
server for simulating HTTPS connections.
|
|
123
|
-
|
|
124
|
-
- intermediate_ca_cert.pem
|
|
125
|
-
- ok_cert_by_intermediate.pem
|
|
126
|
-
These certificates simulate a more common chain of root (root_ca_cert.pem)
|
|
127
|
-
to intermediate (intermediate_ca_cert.pem) to leaf
|
|
128
|
-
(ok_cert_by_intermediate.pem).
|
|
129
|
-
|
|
130
|
-
- wildcard_.pem
|
|
131
|
-
A certificate and private key valid for *.example.org, used in various
|
|
132
|
-
net unit tests.
|
|
133
|
-
|
|
134
|
-
- test_names.pem
|
|
135
|
-
A certificate and private key valid for a number of test names. See
|
|
136
|
-
[test_names] in ee.cnf. Other names may be added as needed.
|
|
137
|
-
|
|
138
|
-
- bad_validity.pem
|
|
139
|
-
A certificate and private key only valid on 0001-01-01. Windows refuses to
|
|
140
|
-
parse this certificate.
|
|
141
|
-
|
|
142
|
-
- spdy_pooling.pem : Used to test the handling of spdy IP connection pooling
|
|
143
|
-
|
|
144
|
-
- subjectAltName_sanity_check.pem : Used to test the handling of various types
|
|
145
|
-
within the subjectAltName extension of a certificate.
|
|
146
|
-
|
|
147
|
-
- policies_sanity_check.pem : Used to test the parsing of various types of
|
|
148
|
-
certificatePolicies extension policyQualifiers.
|
|
149
|
-
|
|
150
|
-
- punycodetest.pem : A test self-signed server certificate with punycode name.
|
|
151
|
-
The common name is "xn--wgv71a119e.com" (日本語.com)
|
|
152
|
-
|
|
153
|
-
- sha1_2016.pem
|
|
154
|
-
Used to test the handling of SHA1 certificates expiring in 2016.
|
|
155
|
-
|
|
156
|
-
- 10_year_validity.pem
|
|
157
|
-
- 11_year_validity.pem
|
|
158
|
-
- 39_months_after_2015_04.pem
|
|
159
|
-
- 40_months_after_2015_04.pem
|
|
160
|
-
- 60_months_after_2012_07.pem
|
|
161
|
-
- 61_months_after_2012_07.pem
|
|
162
|
-
- pre_br_validity_bad_121.pem
|
|
163
|
-
- pre_br_validity_bad_2020.pem
|
|
164
|
-
- pre_br_validity_ok.pem
|
|
165
|
-
- start_after_expiry.pem
|
|
166
|
-
Certs to test that the maximum validity durations set by the CA/Browser
|
|
167
|
-
Forum Baseline Requirements are enforced.
|
|
168
|
-
|
|
169
|
-
- pre_june_2016.pem
|
|
170
|
-
- post_june_2016.pem
|
|
171
|
-
- dec_2017.pem
|
|
172
|
-
Certs to test that policies related to enforcing CT on Symantec are
|
|
173
|
-
properly gated on the issuance date. See
|
|
174
|
-
https://g.co/chrome/symantecpkicerts. (Note, however, that the leaf and
|
|
175
|
-
root do not actually form a chain.)
|
|
176
|
-
|
|
177
|
-
- may_2018.pem
|
|
178
|
-
An 825-day certificate issued on May 1, 2018, the official start of
|
|
179
|
-
enforcement requiring Certificate Transparency for new certificates. This
|
|
180
|
-
certificate does not have any embedded SCTs.
|
|
181
|
-
|
|
182
|
-
- x509_verify_results.chain.pem : A simple certificate chain used to test that
|
|
183
|
-
the correctly ordered, filtered certificate chain is returned during
|
|
184
|
-
verification, regardless of the order in which the intermediate/root CA
|
|
185
|
-
certificates are provided.
|
|
186
|
-
|
|
187
|
-
- ev_test.pem
|
|
188
|
-
- ev_test_state_only.pem
|
|
189
|
-
Certificates for testing EV display (including regression test for
|
|
190
|
-
https://crbug.com/1069113).
|
|
191
|
-
|
|
192
|
-
===== From net/data/ssl/scripts/generate-test-keys.sh
|
|
193
|
-
- rsa-{768,1024,2048}-{1..3}.key
|
|
194
|
-
- ec-prime256v1-{1..3}.key
|
|
195
|
-
Pre-generated keys of various types/sizes.
|
|
196
|
-
Useful for tests that generate RSA certificates with CertBuilder without
|
|
197
|
-
having to pay the cost of generating RSA keys at runtime. Multiple keys
|
|
198
|
-
of each size are provided. (EC keys are cheap to generate at runtime, but
|
|
199
|
-
having some as files simplifies test logic in cases where the test is
|
|
200
|
-
reading both RSA and EC keys from files.)
|
|
201
|
-
|
|
202
|
-
===== From net/data/ssl/scripts/generate-redundant-test-chains.sh
|
|
203
|
-
- redundant-validated-chain.pem
|
|
204
|
-
- redundant-server-chain.pem
|
|
205
|
-
- redundant-validated-chain-root.pem
|
|
206
|
-
|
|
207
|
-
Two chains, A -> B -> C -> D and A -> B -> C2 (C and C2 share the same
|
|
208
|
-
public key) to test that SSLInfo gets the reconstructed, re-ordered
|
|
209
|
-
chain instead of the chain as served. See
|
|
210
|
-
SSLClientSocketTest.VerifyReturnChainProperlyOrdered in
|
|
211
|
-
net/socket/ssl_client_socket_unittest.cc. These chains are valid until
|
|
212
|
-
26 Feb 2022 and are generated by
|
|
213
|
-
net/data/ssl/scripts/generate-redundant-test-chains.sh.
|
|
214
|
-
|
|
215
|
-
===== From net/data/ssl/scripts/generate-client-certificates.sh
|
|
216
|
-
- client_1.pem
|
|
217
|
-
- client_1.key
|
|
218
|
-
- client_1.pk8
|
|
219
|
-
- client_1_ca.pem
|
|
220
|
-
- client_2.pem
|
|
221
|
-
- client_2.key
|
|
222
|
-
- client_2.pk8
|
|
223
|
-
- client_2_ca.pem
|
|
224
|
-
- client_3.pem
|
|
225
|
-
- client_3.key
|
|
226
|
-
- client_3.pk8
|
|
227
|
-
- client_3_ca.pem
|
|
228
|
-
- client_4.pem
|
|
229
|
-
- client_4.key
|
|
230
|
-
- client_4.pk8
|
|
231
|
-
- client_4_ca.pem
|
|
232
|
-
- client_5.pem
|
|
233
|
-
- client_5.key
|
|
234
|
-
- client_5.pk8
|
|
235
|
-
- client_5_ca.pem
|
|
236
|
-
- client_6.pem
|
|
237
|
-
- client_6.key
|
|
238
|
-
- client_6.pk8
|
|
239
|
-
- client_6_ca.pem
|
|
240
|
-
- client_root_ca.pem
|
|
241
|
-
This is a set of files used to unit test SSL client certificate
|
|
242
|
-
authentication.
|
|
243
|
-
- client_1_ca.pem and client_2_ca.pem are the certificates of
|
|
244
|
-
two distinct signing CAs.
|
|
245
|
-
- client_1.pem and client_1.key correspond to the certificate and
|
|
246
|
-
private key for a first certificate signed by client_1_ca.pem.
|
|
247
|
-
- client_2.pem and client_2.key correspond to the certificate and
|
|
248
|
-
private key for a second certificate signed by client_2_ca.pem.
|
|
249
|
-
- each .pk8 file contains the same key as the corresponding .key file
|
|
250
|
-
as PKCS#8 PrivateKeyInfo in DER encoding.
|
|
251
|
-
- client_3.pem is nearly identical to client_2.pem, except it is used
|
|
252
|
-
to test wifi EAP-TLS authentication so it uses a different set
|
|
253
|
-
of X509v3 extensions. Specifically it includes two Subject
|
|
254
|
-
Alternative Name fields recognized by Chrome OS.
|
|
255
|
-
- client_4.pem is similar to client_2.pem but is a P-256 ECDSA key rather
|
|
256
|
-
than RSA.
|
|
257
|
-
- client_5.pem is similar to client_2.pem but is a P-384 ECDSA key rather
|
|
258
|
-
than RSA.
|
|
259
|
-
- client_6.pem is similar to client_2.pem but is a P-521 ECDSA key rather
|
|
260
|
-
than RSA.
|
|
261
|
-
- client_root_ca.pem is the CA certificate which signed client_*_ca.pem.
|
|
262
|
-
|
|
263
|
-
===== From net/data/ssl/scripts/generate-bad-eku-certs.sh
|
|
264
|
-
- eku-test-root.pem
|
|
265
|
-
- non-crit-codeSigning-chain.pem
|
|
266
|
-
- crit-codeSigning-chain.pem
|
|
267
|
-
Two code-signing certificates (eKU: codeSigning; eKU: critical,
|
|
268
|
-
codeSigning) which we use to test that clients are making sure that web
|
|
269
|
-
server certs are checked for correct eKU fields (when an eKU field is
|
|
270
|
-
present). Since codeSigning is not valid for web server auth, the checks
|
|
271
|
-
should fail.
|
|
272
|
-
|
|
273
|
-
===== From net/data/ssl/scripts/generate-multi-root-test-chains.sh
|
|
274
|
-
- multi-root-chain1.pem
|
|
275
|
-
- multi-root-chain2.pem
|
|
276
|
-
Two chains, A -> B -> C -> D and A -> B -> C2 -> E (C and C2 share the
|
|
277
|
-
same public key) to test that certificate validation caching does not
|
|
278
|
-
interfere with the chain_verify_callback used by CertVerifyProcChromeOS.
|
|
279
|
-
See CertVerifyProcChromeOSTest.
|
|
280
|
-
|
|
281
|
-
===== From net/data/ssl/scripts/generate-multi-root-keychain.sh
|
|
282
|
-
- multi-root.keychain: An OSX Keychain containing the generated
|
|
283
|
-
certificates multi-root-*-by-*.pem
|
|
284
|
-
|
|
285
|
-
===== From net/data/ssl/scripts/generate-duplicate-cn-certs.sh
|
|
286
|
-
- duplicate_cn_1.p12
|
|
287
|
-
- duplicate_cn_1.pem
|
|
288
|
-
- duplicate_cn_2.p12
|
|
289
|
-
- duplicate_cn_2.pem
|
|
290
|
-
Two certificates from the same issuer that share the same common name,
|
|
291
|
-
but have distinct subject names (namely, their O fields differ). NSS
|
|
292
|
-
requires that certificates have unique nicknames if they do not share the
|
|
293
|
-
same subject, and these certificates are used to test that the nickname
|
|
294
|
-
generation algorithm generates unique nicknames.
|
|
295
|
-
The .pem versions contain just the certs, while the .p12 versions contain
|
|
296
|
-
both the cert and a private key, since there are multiple ways to import
|
|
297
|
-
certificates into NSS.
|
|
298
|
-
|
|
299
|
-
===== From net/data/ssl/scripts/generate-self-signed-certs.sh
|
|
300
|
-
- self-signed-invalid-name.pem
|
|
301
|
-
- self-signed-invalid-sig.pem
|
|
302
|
-
Two "self-signed" certificates with mismatched names or an invalid
|
|
303
|
-
signature, respectively.
|
|
304
|
-
|
|
305
|
-
===== From net/data/ssl/scripts/generate-key-usage-certs.sh
|
|
306
|
-
- key_usage_rsa_no_extension.pem
|
|
307
|
-
- key_usage_rsa_keyencipherment.pem
|
|
308
|
-
- key_usage_rsa_digitalsignature.pem
|
|
309
|
-
- key_usage_rsa_both.pem
|
|
310
|
-
Self-signed RSA certificates with various combinations of keyUsage
|
|
311
|
-
flags. Their private key is key_usage_rsa.key.
|
|
312
|
-
|
|
313
|
-
- key_usage_p256_no_extension.pem
|
|
314
|
-
- key_usage_p256_keyagreement.pem
|
|
315
|
-
- key_usage_p256_digitalsignature.pem
|
|
316
|
-
- key_usage_p256_both.pem
|
|
317
|
-
Self-signed P-256 certificates with various combinations of keyUsage
|
|
318
|
-
flags. Their private key is key_usage_p256.key.
|
|
@@ -1,87 +0,0 @@
|
|
|
1
|
-
This directory contains test data for verifying certificate chains.
|
|
2
|
-
|
|
3
|
-
Tests are grouped into directories that contain the keys, python to generate
|
|
4
|
-
chains, and test expectations. "DIR" is used as a generic placeholder below to
|
|
5
|
-
identify such a directory.
|
|
6
|
-
|
|
7
|
-
===============================
|
|
8
|
-
DIR/generate-chains.py
|
|
9
|
-
===============================
|
|
10
|
-
|
|
11
|
-
Python script that generates one or more ".pem" file containing a sequence of
|
|
12
|
-
CERTIFICATE blocks. In most cases it will generate a single chain called
|
|
13
|
-
"chain.pem".
|
|
14
|
-
|
|
15
|
-
===============================
|
|
16
|
-
DIR/keys/*.key
|
|
17
|
-
===============================
|
|
18
|
-
|
|
19
|
-
The keys used (as well as generated) by the .py file generate-chains.py. The
|
|
20
|
-
private keys shouldn't be needed to run the tests, however are useful when
|
|
21
|
-
re-generating the test data to have stable results (at least for signature
|
|
22
|
-
types which are deterministic, like RSASSA PKCS#1 which is used by most of the
|
|
23
|
-
certificates data).
|
|
24
|
-
|
|
25
|
-
===============================
|
|
26
|
-
DIR/*.pem
|
|
27
|
-
===============================
|
|
28
|
-
|
|
29
|
-
A sequence of CERTIFICATE blocks that was created by the generate-chains.py
|
|
30
|
-
script. (Although in a few cases there are manually created .pem files that
|
|
31
|
-
lack a generator script).
|
|
32
|
-
|
|
33
|
-
===============================
|
|
34
|
-
DIR/*.test
|
|
35
|
-
===============================
|
|
36
|
-
|
|
37
|
-
A sequence of key-value pairs that identify the inputs to certificate
|
|
38
|
-
verification, as well as the expected outputs. The format is essentially a
|
|
39
|
-
newline separated sequence of key/value pairs:
|
|
40
|
-
|
|
41
|
-
key: value\n
|
|
42
|
-
|
|
43
|
-
All keys must be specified by tests, although they can be in any order.
|
|
44
|
-
The possible keys are:
|
|
45
|
-
|
|
46
|
-
"chain" - The value is a file path (relative to the test file) to a .pem
|
|
47
|
-
containing the CERTIFICATE chain.
|
|
48
|
-
|
|
49
|
-
"last_cert_trust" - The value identifies the trustedness of the last
|
|
50
|
-
certificate in the chain (i.e. whether it is a trust anchor or not). This
|
|
51
|
-
maps to the CertificateTrustType enum. Possible values are:
|
|
52
|
-
"TRUSTED_ANCHOR"
|
|
53
|
-
"TRUSTED_ANCHOR_WITH_EXPIRATION"
|
|
54
|
-
"TRUSTED_ANCHOR_WITH_CONSTRAINTS"
|
|
55
|
-
"UNSPECIFIED"
|
|
56
|
-
"DISTRUSTED"
|
|
57
|
-
|
|
58
|
-
"utc_time" - A string encoding for the generalized time at which verification
|
|
59
|
-
should be done. Example "150302120000Z"
|
|
60
|
-
|
|
61
|
-
"key_purpose" - The expected EKU to use when verifying. Maps to
|
|
62
|
-
KeyPurpose enum. Possible values are:
|
|
63
|
-
"ANY_EKU"
|
|
64
|
-
"SERVER_AUTH"
|
|
65
|
-
"CLIENT_AUTH"
|
|
66
|
-
|
|
67
|
-
"errors" - This has special parsing rules: it is interpreted as the
|
|
68
|
-
final key in the file. All lines after "errors:\n" are read as being the
|
|
69
|
-
error string (this allows embedding newlines in it).
|
|
70
|
-
|
|
71
|
-
Additionally, it is possible to add python-style comments by starting a line
|
|
72
|
-
with "#".
|
|
73
|
-
|
|
74
|
-
===============================
|
|
75
|
-
pkits_errors/*.txt
|
|
76
|
-
===============================
|
|
77
|
-
|
|
78
|
-
These files contain the expected errors for PKITS tests
|
|
79
|
-
(third_party/nist-pkits). The file name correspond so the PKITS tests number.
|
|
80
|
-
They are baselined specifically for VerifyCertificateChain().
|
|
81
|
-
|
|
82
|
-
===============================
|
|
83
|
-
generate-all.sh
|
|
84
|
-
===============================
|
|
85
|
-
|
|
86
|
-
Runs all of the generate-chains.py scripts and cleans up the temp files
|
|
87
|
-
afterwards.
|
|
@@ -1,35 +0,0 @@
|
|
|
1
|
-
This directory contains test data for testing net::VerifySignedData().
|
|
2
|
-
|
|
3
|
-
When adding or changing test data, run the script
|
|
4
|
-
$ python annotate_test_data.py
|
|
5
|
-
|
|
6
|
-
This script will apply a uniform formatting. For instance it will add a
|
|
7
|
-
comment showing what the parsed ASN.1 looks like, and reformat the base64 to
|
|
8
|
-
have consistent line breaks.
|
|
9
|
-
|
|
10
|
-
The general format for the test files is as follows:
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
<A description of the test>
|
|
14
|
-
|
|
15
|
-
-----BEGIN PUBLIC KEY-----
|
|
16
|
-
<base64-encoded, DER-encoded, SPKI>
|
|
17
|
-
-----END PUBLIC KEY-----
|
|
18
|
-
|
|
19
|
-
-----BEGIN ALGORITHM-----
|
|
20
|
-
<base64-encoded, DER-encoded, AlgorithmIdentifier for the signature.>
|
|
21
|
-
-----END ALGORITHM-----
|
|
22
|
-
|
|
23
|
-
-----BEGIN DATA-----
|
|
24
|
-
<base64-encoded data that is being verified>
|
|
25
|
-
-----END DATA-----
|
|
26
|
-
|
|
27
|
-
-----BEGIN SIGNATURE-----
|
|
28
|
-
<base64-encoded, DER-encoded, BIT STRING of the signature>
|
|
29
|
-
-----END SIGNATURE-----
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
Comments for a PEM block should be placed immediately below that block.
|
|
33
|
-
The script will also insert a comment after the block describing its parsed
|
|
34
|
-
ASN.1 structure (your extra comments need to be above the script-generated
|
|
35
|
-
comments or they will be stripped).
|
|
@@ -1,11 +0,0 @@
|
|
|
1
|
-
Name: Fiat-Crypto: Synthesizing Correct-by-Construction Code for Cryptographic Primitives
|
|
2
|
-
Short Name: fiat-crypto
|
|
3
|
-
URL: https://github.com/mit-plv/fiat-crypto
|
|
4
|
-
Version: git (see METADATA)
|
|
5
|
-
License: MIT
|
|
6
|
-
License File: LICENSE
|
|
7
|
-
Security Critical: yes
|
|
8
|
-
Shipped: yes
|
|
9
|
-
|
|
10
|
-
Description:
|
|
11
|
-
See README.md and METADATA.
|