openssl/test/certs
erbsland-dev 7d2c0a4b1f Make x509_req_test ANSI Compatible
Update the `x509_req_test` to ensure ANSI compatibility. The integrated certificate string was too long, so the PEM certificate has been moved to `certs/x509-req-detect-invalid-version.pem`. The test have been updated to load this certificate from the file on disk.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24677)
2024-06-21 15:40:45 -04:00
..
acert_bc1.pem x509_acert: Add more parsing and printing tests 2024-04-24 14:08:05 +01:00
acert_bc2.pem x509_acert: Add more parsing and printing tests 2024-04-24 14:08:05 +01:00
acert_ietf.pem x509_acert: Add simple API tests 2024-04-24 14:05:35 +01:00
acert.pem x509_acert: Add simple API tests 2024-04-24 14:05:35 +01:00
alt1-cert.pem
alt1-key.pem
alt2-cert.pem
alt2-key.pem
alt3-cert.pem
alt3-key.pem
bad-othername-cert.pem
bad-othername-namec-inter.pem
bad-othername-namec-key.pem
bad-othername-namec.pem
bad-pc3-cert.pem
bad-pc3-key.pem
bad-pc4-cert.pem
bad-pc4-key.pem
bad-pc6-cert.pem
bad-pc6-key.pem
bad.key
bad.pem
badalt1-cert.pem
badalt1-key.pem
badalt2-cert.pem
badalt2-key.pem
badalt3-cert.pem
badalt3-key.pem
badalt4-cert.pem
badalt4-key.pem
badalt5-cert.pem
badalt5-key.pem
badalt6-cert.pem
badalt6-key.pem
badalt7-cert.pem
badalt7-key.pem
badalt8-cert.pem
badalt8-key.pem
badalt9-cert.pem
badalt9-key.pem
badalt10-cert.pem
badalt10-key.pem
badcn1-cert.pem
badcn1-key.pem
ca-anyEKU.pem
ca-cert2.pem
ca-cert-768.pem
ca-cert-768i.pem
ca-cert-ec-explicit.pem
ca-cert-ec-named.pem
ca-cert-md5-any.pem
ca-cert-md5.pem
ca-cert.pem
ca-clientAuth.pem
ca-expired.pem
ca-key2.pem
ca-key-768.pem
ca-key-ec-explicit.pem
ca-key-ec-named.pem
ca-key.pem
ca-name2.pem
ca-nonbc.pem
ca-nonca.pem
ca-pol-cert.pem
ca-pss-cert.pem
ca-pss-key.pem
ca-root2.pem
ca-serverAuth.pem
ca+anyEKU.pem
ca+clientAuth.pem
ca+serverAuth.pem
cca-anyEKU.pem
cca-cert.pem
cca-clientAuth.pem
cca-serverAuth.pem
cca+anyEKU.pem
cca+clientAuth.pem
cca+serverAuth.pem
cert-key-cert.pem
client-ed448-cert.pem
client-ed448-key.pem
client-ed25519-cert.pem
client-ed25519-key.pem
client-pss-restrict-cert.pem
client-pss-restrict-key.pem
croot-anyEKU.pem
croot-cert.pem
croot-clientAuth.pem
croot-serverAuth.pem
croot+anyEKU.pem
croot+clientAuth.pem
croot+serverAuth.pem
cross-key.pem
cross-root.pem
ct-server-key-public.pem
ct-server-key.pem
cyrillic_crl.pem
cyrillic_crl.utf8
cyrillic.msb
cyrillic.pem
cyrillic.utf8
dhk2048.pem
dhp2048.pem
ec_privkey_with_chain.pem
ee-cert2.pem
ee-cert-768.pem
ee-cert-768i.pem
ee-cert-1024.pem
ee-cert-3072.pem
ee-cert-4096.pem
ee-cert-8192.pem
ee-cert-crit-unknown-ext.pem
ee-cert-ec-explicit.pem
ee-cert-ec-named-explicit.pem
ee-cert-ec-named-named.pem
ee-cert-ec-sha3-224.pem test: add verify test for EC cert signed with SHA3 2023-10-02 12:46:24 +02:00
ee-cert-ec-sha3-256.pem test: add verify test for EC cert signed with SHA3 2023-10-02 12:46:24 +02:00
ee-cert-ec-sha3-384.pem test: add verify test for EC cert signed with SHA3 2023-10-02 12:46:24 +02:00
ee-cert-ec-sha3-512.pem test: add verify test for EC cert signed with SHA3 2023-10-02 12:46:24 +02:00
ee-cert-md5.pem
ee-cert-noncrit-unknown-ext.pem
ee-cert-ocsp-nocheck.pem
ee-cert-policies-bad.pem
ee-cert-policies.pem
ee-cert.pem
ee-client-chain.pem
ee-client.pem
ee-clientAuth.pem
ee-codesign-anyextkeyusage.pem
ee-codesign-crlsign.pem
ee-codesign-keycertsign.pem
ee-codesign-noncritical.pem
ee-codesign-serverauth.pem
ee-codesign.pem
ee-ecdsa-client-chain.pem
ee-ecdsa-key.pem
ee-ed25519.pem
ee-expired.pem
ee-key-768.pem
ee-key-1024.pem
ee-key-3072.pem
ee-key-4096.pem
ee-key-8192.pem
ee-key-ec-explicit.pem
ee-key-ec-named-explicit.pem
ee-key-ec-named-named.pem
ee-key.pem
ee-name2.pem
ee-pathlen.pem
ee-pss-cert.pem
ee-pss-sha1-cert.pem
ee-pss-sha256-cert.pem
ee-pss-wrong1.5-cert.pem
ee-self-signed-pss.pem Add test for ASN1_item_verify() 2024-06-21 10:03:42 +02:00
ee-self-signed.pem
ee-serverAuth.pem
ee-ss-with-keyCertSign.pem
ee-timestampsign-CABforum-anyextkeyusage.pem
ee-timestampsign-CABforum-crlsign.pem
ee-timestampsign-CABforum-keycertsign.pem
ee-timestampsign-CABforum-noncritxku.pem
ee-timestampsign-CABforum-serverauth.pem
ee-timestampsign-CABforum.pem
ee-timestampsign-rfc3161-digsig.pem
ee-timestampsign-rfc3161-noncritxku.pem
ee-timestampsign-rfc3161.pem
ee+clientAuth.pem
ee+serverAuth.pem
embeddedSCTs1_issuer-key.pem
embeddedSCTs1_issuer.pem
embeddedSCTs1-key.pem
embeddedSCTs1.pem
embeddedSCTs1.sct
embeddedSCTs1.tlssct
embeddedSCTs3_issuer.pem
embeddedSCTs3.pem
embeddedSCTs3.sct
ext-check.csr
ext-delegatedNameConstraints.pem feat: add delegatedNameConstraints and holderNameConstraints exts 2024-06-20 19:59:22 +02:00
ext-groupAC.pem
ext-holderNameConstraints.pem feat: add delegatedNameConstraints and holderNameConstraints exts 2024-06-20 19:59:22 +02:00
ext-indirectIssuer.pem
ext-noAssertion.pem
ext-noRevAvail.pem
ext-singleUse.pem
ext-sOAIdentifier.pem
ext-targetingInformation.pem Add support for targetingInformation X.509v3 extension 2024-06-17 14:03:25 +02:00
fake-gp.pem
goodcn1-cert.pem
goodcn1-key.pem
goodcn2-cert.pem
goodcn2-chain.pem
goodcn2-key.pem
grfc.pem
interCA.key
interCA.pem
invalid-cert.pem
key-pass-12345.pem
leaf-chain.pem
leaf-encrypted.key
leaf.key
leaf.pem
many-constraints.pem
many-names1.pem
many-names2.pem
many-names3.pem
mkcert.sh
nca+anyEKU.pem
nca+serverAuth.pem
ncca1-cert.pem
ncca1-key.pem
ncca2-cert.pem
ncca2-key.pem
ncca3-cert.pem
ncca3-key.pem
ncca-cert.pem
ncca-key.pem
nccaothername-cert.pem
nccaothername-key.pem
nroot+anyEKU.pem
nroot+serverAuth.pem
p256-server-cert.pem
p256-server-key.pem
p384-root-key.pem
p384-root.pem
p384-server-cert.pem
p384-server-key.pem
pathlen.pem
pc1-cert.pem
pc1-key.pem
pc2-cert.pem
pc2-key.pem
pc5-cert.pem
pc5-key.pem
pkitsta.pem
root2-serverAuth.pem
root2+clientAuth.pem
root2+serverAuth.pem
root-anyEKU.pem
root-cert2.pem
root-cert-768.pem
root-cert-md5.pem
root-cert-rsa2.pem
root-cert.pem
root-clientAuth.pem
root-cross-cert.pem
root-ed448-cert.pem
root-ed448-key.pem
root-ed25519.pem
root-ed25519.privkey.pem
root-ed25519.pubkey.pem
root-expired.pem
root-key2.pem
root-key-768.pem
root-key.pem
root-name2.pem
root-nonca.pem
root-noserver.pem
root-serverAuth.pem
root+anyEKU.pem
root+clientAuth.pem
root+serverAuth.pem
rootCA.key
rootCA.pem
rootcert.pem
rootkey.pem
roots.pem
sca-anyEKU.pem
sca-cert.pem
sca-clientAuth.pem
sca-serverAuth.pem
sca+anyEKU.pem
sca+clientAuth.pem
sca+serverAuth.pem
server-cecdsa-cert.pem
server-cecdsa-key.pem
server-dsa-cert.pem
server-dsa-key.pem
server-dsa-pubkey.pem
server-ecdsa-brainpoolP256r1-cert.pem
server-ecdsa-brainpoolP256r1-key.pem
server-ecdsa-cert.pem
server-ecdsa-key.pem
server-ed448-cert.pem
server-ed448-key.pem
server-ed25519-cert.pem
server-ed25519-key.pem
server-pss-cert.pem
server-pss-key.pem
server-pss-restrict-cert.pem
server-pss-restrict-key.pem
server-trusted.pem
servercert.pem
serverkey.pem
setup.sh Add test for ASN1_item_verify() 2024-06-21 10:03:42 +02:00
sm2-ca-cert.pem
sm2-csr.pem
sm2-pub.key
sm2-root.crt
sm2-root.key
sm2.key
sm2.pem
some-names1.pem
some-names2.pem
some-names3.pem
sroot-anyEKU.pem
sroot-cert.pem
sroot-clientAuth.pem
sroot-serverAuth.pem
sroot+anyEKU.pem
sroot+clientAuth.pem
sroot+serverAuth.pem
subinterCA-ss.pem
subinterCA.key
subinterCA.pem
timing-cert.pem
timing-key.pem
untrusted.pem
v3-certs-RC2.p12
v3-certs-TDES.p12
wrongcert.pem
wrongkey.pem
x509-check-key.pem
x509-check.csr
x509-req-detect-invalid-version.pem Make x509_req_test ANSI Compatible 2024-06-21 15:40:45 -04:00